Two matrices for Blakley's secret sharing scheme
暂无分享,去创建一个
[1] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[2] Xiaojiang Du,et al. A distributed login framework for semi-structured Peer-to-Peer networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[3] Ali Aydin Selçuk,et al. Practical Threshold Signatures with Linear Secret Sharing Schemes , 2009, AFRICACRYPT.
[4] G. R. Blakley,et al. Linear Algebra Approach to Secret Sharing Schemes , 1993, Error Control, Cryptology, and Speech Compression.
[5] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[6] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[7] Kamer Kaya,et al. Threshold Cryptography Based on Blakley Secret Sharing , 2008 .
[8] Hao-Kuan Tso. Sharing secret images using Blakley's concept , 2008 .
[9] Chien-Chang Chen,et al. A Geometry-Based Secret Image Sharing Approach , 2008, J. Inf. Sci. Eng..
[10] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[11] Vasif V. Nabiyev,et al. Improvements in Geometry-Based Secret Image Sharing Approach with Steganography , 2009 .
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.