Strong security of linear ramp secret sharing schemes with general access structures
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Chaoping Xing,et al. Coding Theory: A First Course , 2004 .
[3] Kaoru Kurosawa,et al. Nonperfect Secret Sharing Schemes and Matroids , 1994, EUROCRYPT.
[4] Umberto Martínez-Peñas,et al. Communication Efficient and Strongly Secure Secret Sharing Schemes Based on Algebraic Geometry Codes , 2016, IEEE Transactions on Information Theory.
[5] S. Tsujii,et al. Nonperfect Secret Sharing Schemes , 1992, AUSCRYPT.
[6] Carles Padró,et al. On the optimization of bipartite secret sharing schemes , 2012, Des. Codes Cryptogr..
[7] Richard A. Brualdi,et al. Determinantal identities: Gauss, Schur, Cauchy, Sylvester, Kronecker, Jacobi, Binet, Laplace, Muir, and Cayley , 1983 .
[8] Noboru Kunihiro,et al. Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes , 2019, 2019 IEEE Information Theory Workshop (ITW).
[9] Richard Zippel,et al. Probabilistic algorithms for sparse polynomials , 1979, EUROSAM.
[10] Ryutaroh Matsumoto. Strong Security of the Strongly Multiplicative Ramp Secret Sharing Based on Algebraic Curves , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[11] Nishiara Mikihiko,et al. Strongly Secure Secret Sharing Scheme with Ramp Threshold based on Shamir's Polynomial Interpolation Scheme , 2009 .
[12] Germán Sáez,et al. New results and applications for multi-secret sharing schemes , 2014, Des. Codes Cryptogr..
[13] Mitsugu Iwamoto,et al. Strongly secure ramp secret sharing schemes for general access structures , 2005, Inf. Process. Lett..
[14] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[15] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[16] Carles Padró,et al. Ideal Multipartite Secret Sharing Schemes , 2007, Journal of Cryptology.
[17] Carles Padró,et al. On the Information Ratio of Non-perfect Secret Sharing Schemes , 2017, Algorithmica.
[18] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[19] Giovanni Di Crescenzo,et al. Multi-Secret Sharing Schemes , 1994, CRYPTO.
[20] Toru Fujiwara,et al. Optimal Uniform Secret Sharing , 2019, IEEE Transactions on Information Theory.
[21] Hirosuke Yamamoto,et al. Secret sharing system using (k, L, n) threshold scheme , 1986 .
[22] Barbara Masucci. Sharing Multiple Secrets: Models, Schemes and Analysis , 2006, Des. Codes Cryptogr..
[23] Douglas R. Stinson,et al. Decomposition constructions for secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.
[24] Tomohiko Uyematsu,et al. Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight , 2012, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[25] Jacob T. Schwartz,et al. Fast Probabilistic Algorithms for Verification of Polynomial Identities , 1980, J. ACM.
[26] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[27] Marten van Dijk,et al. A General Decomposition Construction for Incomplete Secret Sharing Schemes , 1998, Des. Codes Cryptogr..
[28] Richard C. Singleton,et al. Maximum distance q -nary codes , 1964, IEEE Trans. Inf. Theory.
[29] Suresh C. Kothari,et al. Generalized Linear Threshold Scheme , 1985, CRYPTO.
[30] Ryutaroh Matsumoto,et al. Optimal multiple assignment scheme for strongly secure ramp secret sharing schemes with general access structures , 2015 .
[31] Mitsugu Iwamoto,et al. Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes with General Access Structures , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[32] Kaoru Kurosawa,et al. Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes , 1994, ASIACRYPT.