Staircase codes for secret sharing with optimal communication and read overheads
暂无分享,去创建一个
[1] Yeow Meng Chee,et al. Threshold changeable secret sharing schemes revisited , 2012, Theor. Comput. Sci..
[2] Duncan S. Wong,et al. On Secret Reconstruction in Secret Sharing Schemes , 2008, IEEE Transactions on Information Theory.
[3] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[4] Carles Padró,et al. Lecture Notes in Secret Sharing , 2012, IACR Cryptol. ePrint Arch..
[5] Josef Pieprzyk,et al. Changing Thresholds in the Absence of Secure Channels , 1999, Aust. Comput. J..
[6] Amos Beimel,et al. Secret-Sharing Schemes: A Survey , 2011, IWCC.
[7] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[8] Hong Zhong,et al. A Secret Sharing Scheme with the Changeable Threshold Value , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.
[9] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[10] Emina Soljanin,et al. Secure Network Coding for Wiretap Networks of Type II , 2009, IEEE Transactions on Information Theory.
[11] Adi Shamir,et al. How to share a secret , 1979, CACM.
[12] Ivan Damgård,et al. Secure Multiparty Computation and Secret Sharing , 2015 .
[13] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[14] Nihar B. Shah,et al. Information-Theoretically Secure Regenerating Codes for Distributed Storage , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[15] Nihar B. Shah,et al. Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction , 2010, IEEE Transactions on Information Theory.
[16] Hung-Yu Chien,et al. A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .
[17] Kannan Ramchandran,et al. Distributed Secret Dissemination Across a Network , 2012, IEEE Journal of Selected Topics in Signal Processing.
[18] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[19] Sriram Vishwanath,et al. Centralized Repair of Multiple Node Failures With Applications to Communication Efficient Secret Sharing , 2016, IEEE Transactions on Information Theory.
[20] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[21] Feng Wang,et al. Dynamic threshold changeable multi-policy secret sharing scheme , 2015, Secur. Commun. Networks.
[22] Cunsheng Ding,et al. Several Generalizations Of Shamir's Secret Sharing Scheme , 2004, Int. J. Found. Comput. Sci..
[23] Douglas R. Stinson,et al. On dealer-free dynamic threshold schemes , 2013, Adv. Math. Commun..
[24] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[25] Wentao Huang,et al. Communication Efficient Secret Sharing , 2015, IEEE Transactions on Information Theory.