Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract)
暂无分享,去创建一个
[1] Gustavus J. Simmons,et al. A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party , 1991, EUROCRYPT.
[2] R. Gallager. Information Theory and Reliable Communication , 1968 .
[3] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[4] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[5] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[6] Gustavus J. Simmons,et al. The Consequences of Trust in Shared Secret Schemes , 1994, EUROCRYPT.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Douglas R. Stinson,et al. Decomposition constructions for secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.
[9] Keith M. Martin,et al. A combinatorial interpretation of ramp schemes , 1996, Australas. J Comb..