An explication of secret sharing schemes

From MaRDI portal
Revision as of 06:10, 31 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1203951

DOI10.1007/BF00125203zbMath0793.68111MaRDI QIDQ1203951

Douglas R. Stinson

Publication date: 18 February 1993

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)




Related Items (93)

Lower bounds for robust secret sharing schemesBounds And Constructions For Threshold Shared Generation Of AuthenticatorsOn secret sharing schemesRobust vector space secret sharing schemesTwo secret sharing schemes based on Boolean operationsZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher callsSECRET IMAGE SHARING BASED ON CHAOTIC MAP AND CHINESE REMAINDER THEOREMA Latin square autotopism secret sharing schemeOptimal linear secret sharing schemes for graph access structures on six participantsSome democratic secret sharing schemesOn the information rate of perfect secret sharing schemesImproved constructions of secret sharing schemes by applying \((\lambda ,\omega )\)-decompositionsA note on secret sharing schemes with three homogeneous access structureA note on dynamic threshold schemesGeneralised cumulative arrays in secret sharingSecret sharing schemes with partial broadcast channelsUnnamed ItemImproving the linear programming technique in the search for lower bounds in secret sharingOn an infinite family of graphs with information ratio \(2 - 1/k\)Anonymous secret sharing schemesBounds and constructions for unconditionally secure distributed key distribution schemes for general access structuresThe optimal average information ratio of secret-sharing schemes for the access structures based on unicycle graphs and bipartite graphsAll inequalities for the relative entropyApproximation and decomposition in lattices of cluttersSharing one secret vs. sharing many secrets.On identification secret sharing schemes.The complexity of the graph access structures on six participantsRational quantum secret sharing scheme based on GHZ stateFinding lower bounds on the complexity of secret sharing schemes by linear programmingIdeal multipartite secret sharing schemesBalanced equi-\(n\)-squaresIdeal hierarchical secret sharing and lattice path matroidsOn secret sharing protocolsConstructing ideal secret sharing schemes based on Chinese remainder theoremOptimal information ratio of secret sharing schemes on Dutch windmill graphsOperations over Linear Secret Sharing SchemesMulti-party computation with conversion of secret sharingEnumeration of weighted games with minimum and an analysis of voting power for bipartite complete games with minimumLinear algebra approach to secret sharing schemesIdeal Secret Sharing Schemes for Useful Multipartite Access StructuresFully dynamic secret sharing schemesNew bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structuresOn the information rate of secret sharing schemesLower bounds for monotone span programsA new secret sharing schemeA multisecret sharing scheme for color images based on cellular automataSecret sharing schemes for compartmented access structuresSeveral Generalizations of Shamir's Secret Sharing SchemeNearly optimal robust secret sharingAdmissible tracks in Lai-Ding's secret sharing schemeExtending Brickell-Davenport theorem to non-perfect secret sharing schemesNew secret sharing scheme based on linear codeAn ideal multi-secret sharing scheme based on MSPA general approach to robust web meteringOptimal assignment schemes for general access structures based on linear programmingSecret sharing schemes with three or four minimal qualified subsetsProperties and constraints of cheating-immune secret sharing schemesSecret sharing schemes on access structures with intersection number equal to oneAn optimal multisecret threshold scheme constructionSharing multiple secrets: Models, schemes and analysisA secure scheme to share secret color imagesSecret sharing schemes based on graphical codesHow to share a secretOptimal complexity of secret sharing schemes with four minimal qualified subsetsUnnamed ItemOn secret sharing schemes, matroids and polymatroidsReduced access structures with four minimal qualified subsets on six participantsThreshold Secret Sharing Through Multivariate Birkhoff InterpolationThe exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structuresNew schemes for sharing points on an elliptic curveIdeal secret sharing schemes whose minimal qualified subsets have at most three participantsIntroduction to Secret-SharingA perfect threshold secret sharing scheme to identify cheatersGeneration of key predistribution schemes using secret sharing schemesHypergraph decomposition and secret sharingOn the optimization of bipartite secret sharing schemesFormalisation of probabilistic concealmentShared generation of pseudo-random functionsIdeal Hierarchical Secret Sharing SchemesGraph decompositions and secret sharing schemesON THE DEALER'S RANDOMNESS REQUIRED IN PERFECT SECRET SHARING SCHEMES WITH ACCESS STRUCTURES OF CONSTANT RANKCombiner Driven Management Models and Their ApplicationsA secret sharing scheme based on cellular automataLower bounds on the information rate of secret sharing schemes with homogeneous access structure.A note on optimal metering schemes.On the enumeration of Boolean functions with distinguished variablesGeneral Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-VotingRoughly weighted hierarchical simple gamesRandomness in distribution protocolsProbability of shares in secret sharing schemesGeometric secret sharing schemes and their dualsWeighted decomposition construction for perfect secret sharing schemesSecure multi-party computation with a quantum manner



Cites Work


This page was built for publication: An explication of secret sharing schemes