Graph decompositions and secret sharing schemes
暂无分享,去创建一个
[1] Ken Martin. Discrete Structures in the Theory of Secret Sharing , 1991 .
[2] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[5] Gustavus J. Simmons,et al. Prepositioned Shared Secret and/or Shared Control Schemes , 1990, EUROCRYPT.
[6] Amos Beimel,et al. Universally ideal secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.
[7] Ernest F. Brickell,et al. On the classification of ideal secret sharing schemes , 1989, Journal of Cryptology.
[8] J. Massey,et al. Threshold Schemes with Disenrollment , 1993, Proceedings. IEEE International Symposium on Information Theory.
[9] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[10] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[11] Ernest F. Brickell,et al. The Detection of Cheaters in Threshold Schemes , 1990, SIAM J. Discret. Math..
[12] Paul D. Seymour. On secret-sharing matroids , 1992, J. Comb. Theory, Ser. B.
[13] Alfredo De Santis,et al. Efficient Sharing of Many Secrets , 1993, STACS.
[14] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[15] Ernest F. Brickell,et al. Some improved bounds on the information rate of perfect secret sharing schemes , 2006, Journal of Cryptology.
[16] Keith M. Martin,et al. Multisecret Threshold Schemes , 1994, CRYPTO.
[17] Gustavus J. Simmons. Geometric Shared Secret and/or Shared Control Schemes , 1990, CRYPTO.
[18] Alfredo De Santis,et al. On the Information Rate of Secret Sharing Schemes , 1996, Theor. Comput. Sci..
[19] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[20] Alfredo De Santis,et al. Size of Shares and Probability of Cheating in Threshold Schemes , 1994, EUROCRYPT.
[21] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[22] Gustavus J. Simmons,et al. A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party , 1991, EUROCRYPT.
[23] Douglas R. Stinson,et al. New General Lower Bounds on the Information Rate of Secret Sharing Schemes , 1992, CRYPTO.
[24] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[25] Alfredo De Santis,et al. On the Size of Shares for Secret Sharing Schemes , 1991, CRYPTO.
[26] Douglas R. Stinson,et al. Decomposition constructions for secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.
[27] David S. Johnson,et al. Computers and In stractability: A Guide to the Theory of NP-Completeness. W. H Freeman, San Fran , 1979 .
[28] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[29] Gustavus J. Simmons,et al. An Introduction to Shared Secret and/or Shared Control Schemes and Their ApplicationThis work was performed at Sandia National Laboratories and supported by the U.S. Department of Energy under contract number DEAC0476DPOO789. , 1992 .
[30] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[31] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[32] Alfredo De Santis,et al. Fully Dynamic Secret Sharing Schemes , 1996, Theor. Comput. Sci..
[33] Gustavus J. Simmons,et al. How to (Really) Share a Secret , 1988, CRYPTO.
[34] Ed Dawson,et al. Orthogonal arrays and ordered threshold schemes , 1993, Australas. J Comb..