共 17 条
[1]
[Anonymous], P AFIPS 1979 NAT COM
[2]
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[3]
Beimel A., 1996, Secure Schemes for Secret Sharing and Key Distribution
[4]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[5]
Essentially Optimal Robust Secret Sharing with Maximal Corruptions
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I,
2016, 9665
:58-86
[6]
Cevallos A, 2012, LECT NOTES COMPUT SC, V7237, P195, DOI 10.1007/978-3-642-29011-4_13
[7]
Cramer R., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P503
[8]
Cramer R, 2000, LECT NOTES COMPUT SC, V1807, P316
[9]
Cramer R., 2015, SECURE MULTIPARTY CO
[10]
Cramer R, 2008, LECT NOTES COMPUT SC, V4965, P471