共 27 条
- [1] Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 510 - 539
- [2] Alimomeni Mohsen, 2012, Information Theoretic Security. Proceedings of the 6th International Conference, ICITS 2012, P1, DOI 10.1007/978-3-642-32284-6_1
- [3] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
- [4] On the Local Leakage Resilience of Linear Secret Sharing Schemes [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 531 - 561
- [5] Blakley G.R., 1979, P INT WORKSH MAN REQ, V48, P313, DOI 10.1109/MARK.1979.8817296
- [6] Short Leakage Resilient and Non-malleable Secret Sharing Schemes [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 178 - 207
- [7] Invertible Extractors and Wiretap Protocols [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) : 1254 - 1274
- [8] Csiszar I., 1996, Problems of Information Transmission, V32, P40
- [9] de Santis A., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P522, DOI 10.1145/195058.195405
- [10] DESMEDT Y, 1990, LECT NOTES COMPUT SC, V435, P307