Randomness in Distribution Protocols
暂无分享,去创建一个
[1] F. Preparata. Holographic dispersal and recovery of information , 1989, IEEE Trans. Inf. Theory.
[2] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[3] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[4] Hideki Imai,et al. On the Key Predistribution System: A Practical Solution to the Key Distribution Problem , 1987, CRYPTO.
[5] Russell Impagliazzo,et al. How to recycle random bits , 1989, 30th Annual Symposium on Foundations of Computer Science.
[6] Alfredo De Santis,et al. On the Information Rate of Secret Sharing Schemes , 1996, Theor. Comput. Sci..
[7] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[8] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[9] Donald E. Knuth,et al. The Art of Computer Programming, Volume I: Fundamental Algorithms, 2nd Edition , 1997 .
[10] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[11] Andrew Chi-Chih Yao,et al. The complexity of nonuniform random number generation , 1976 .
[12] Matthew K. Franklin,et al. Communication complexity of secure computation (extended abstract) , 1992, STOC '92.
[13] Mihir Bellare,et al. Improved non-approximability results , 1994, STOC '94.
[14] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[15] Carsten Lund,et al. Proof verification and hardness of approximation problems , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.
[16] Alfredo De Santis,et al. Size of Shares and Probability of Cheating in Threshold Schemes , 1994, EUROCRYPT.
[17] Donald E. Knuth. The art of computer programming: fundamental algorithms , 1969 .
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.
[19] Uriel Feige,et al. Two prover protocols: low error at affordable rates , 1994, STOC '94.
[20] Alfredo De Santis,et al. On the Size of Shares for Secret Sharing Schemes , 1991, CRYPTO.
[21] Alfredo De Santis,et al. On Secret Sharing Schemes , 1998, Inf. Process. Lett..
[22] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[23] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[24] Michael O. Rabin,et al. The information dispersal algorithm and its applications , 1990 .
[25] Douglas R. Stinson,et al. On the Dealer's Randomness Required in Secret Sharing Schemes , 1994, Des. Codes Cryptogr..
[26] Alfredo De Santis,et al. Graph Decompositions and Secret Sharing Schemes , 1992, EUROCRYPT.
[27] Alfredo De Santis,et al. Efficient Sharing of Many Secrets , 1993, STACS.
[28] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[29] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[30] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[31] Douglas R. Stinson,et al. Decomposition constructions for secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.
[32] Mihir Bellare,et al. Free bits, PCPs and non-approximability-towards tight results , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[33] Eli Upfal,et al. A time-randomness tradeoff for oblivious routing , 1988, STOC '88.
[34] Alfredo De Santis,et al. On the Information Rate of Secret Sharing Schemes (Extended Abstract) , 1992, CRYPTO.
[35] David Zuckerman,et al. Simulating BPP using a general weak random source , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.