Shadow Generation Protocol in Linguistic Threshold Schemes
暂无分享,去创建一个
[1] Amos Beimel,et al. Universally ideal secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.
[2] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[3] Wei Zhao,et al. Privacy-Preserving Data Mining Systems , 2007, Computer.
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] M.R. Ogiela,et al. Linguistic Extension for Secret Sharing (m, n)-Threshold Schemes , 2008, 2008 International Conference on Security Technology.
[6] G. R. Blakley,et al. Threshold Schemes with Disenrollment , 1992, CRYPTO.
[7] Alfredo De Santis,et al. Constructions and Bounds for Visual Cryptography , 1996, ICALP.
[8] Jean-Jacques Quisquater,et al. Advances in Cryptology — EUROCRYPT ’95 , 2001, Lecture Notes in Computer Science.
[9] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[10] Alfredo De Santis,et al. Lower Bounds for Robust Secret Sharing Schemes , 1997, Inf. Process. Lett..
[11] Ernest F. Brickell,et al. Advances in Cryptology — CRYPTO’ 92 , 2001, Lecture Notes in Computer Science.
[12] Philippe Béguin,et al. General Short Computational Secret Sharing Schemes , 1995, EUROCRYPT.
[13] Marten van Dijk. On the information rate of perfect secret sharing schemes , 1995, Des. Codes Cryptogr..
[14] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[15] Keith M. Martin,et al. Ideal secret sharing schemes with multiple secrets , 1996, Journal of Cryptology.
[16] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[17] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.