Explication of secret sharing schemes

被引:0
|
作者
Stinson, D.R.
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [2] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [3] On identification secret sharing schemes
    Cai, N
    Lam, KY
    INFORMATION AND COMPUTATION, 2003, 184 (02) : 298 - 310
  • [4] On Proactive Secret Sharing Schemes
    Nikov, V
    Nikova, S
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 308 - 325
  • [5] PERFECT SECRET SHARING SCHEMES
    Parvatov, K. G.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 50 - 57
  • [6] Secret sharing schemes on graphs
    Csirmaz, Laszlo
    STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2007, 44 (03) : 297 - 306
  • [7] Efficient Secret Sharing Schemes
    Lv, Chunli
    Jia, Xiaoqi
    Lin, Jingqiang
    Jing, Jiwu
    Tian, Lijun
    Sun, Mingli
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 114 - +
  • [8] Partial Secret Sharing Schemes
    Jafari, Amir
    Khazaei, Shahram
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5364 - 5385
  • [9] Anonymous secret sharing schemes
    Blundo, C
    Stinson, DR
    DISCRETE APPLIED MATHEMATICS, 1997, 77 (01) : 13 - 28
  • [10] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268