Reducing the Share Size in Robust Secret Sharing
暂无分享,去创建一个
[1] Carles Padró,et al. Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors , 2008, EUROCRYPT.
[2] Ivan Damgård,et al. On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase , 2001, CRYPTO.
[3] Carles Padró,et al. Secret Sharing Schemes with Detection of Cheaters for a General Access Structure , 1999, Des. Codes Cryptogr..
[4] Thomas Johansson,et al. On the Relation between A-Codes and Codes Correcting Independent Errors , 1994, EUROCRYPT.
[5] Richard Taylor,et al. An Integrity Check Value Algorithm for Stream Ciphers , 1993, CRYPTO.
[6] Madhu Sudan,et al. Highly Resilient Correctors for Polynomials , 1992, Inf. Process. Lett..
[7] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[8] Gustavus J. Simmons,et al. How to insure that data acquired to verify treaty compliance are trustworthy , 1988, Proc. IEEE.
[9] J. H. van Lint,et al. Introduction to Coding Theory , 1982 .
[10] Adi Shamir,et al. How to share a secret , 1979, CACM.
[11] W. W. Peterson,et al. Encoding and error-correction procedures for the Bose-Chaudhuri codes , 1960, IRE Trans. Inf. Theory.
[12] Richard W. Hamming,et al. Error detecting and error correcting codes , 1950 .
[13] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[14] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[15] Bert den Boer. A Simple and Key-Economical Unconditional Authentication Scheme , 1993, J. Comput. Secur..