On the size of shares for secret sharing schemes

From MaRDI portal
Revision as of 11:31, 31 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1310452

DOI10.1007/BF00198463zbMath0786.68030MaRDI QIDQ1310452

Renato M. Capocelli, Luisa Gargano, Alfredo De Santis, Ugo Vaccaro

Publication date: 3 January 1994

Published in: Journal of Cryptology (Search for Journal in Brave)




Related Items (71)

More information theoretical inequalities to be used in secret sharing?Secret-sharing schemes for very dense graphsOn secret sharing schemesOn the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rateOn Entropy, Information Inequalities, and GroupsA novel group key transfer for big data securityZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher callsOptimal linear secret sharing schemes for graph access structures on six participantsOn the information rate of perfect secret sharing schemesA note on secret sharing schemes with three homogeneous access structureA note on dynamic threshold schemesThreshold Secret Sharing Requires a Linear Size AlphabetSecret sharing schemes with partial broadcast channelsImproving the linear programming technique in the search for lower bounds in secret sharingOn an infinite family of graphs with information ratio \(2 - 1/k\)Anonymous secret sharing schemesOn the information ratio of non-perfect secret sharing schemesSharing one secret vs. sharing many secrets.On identification secret sharing schemes.The complexity of the graph access structures on six participantsIdeal multipartite secret sharing schemesConstructing ideal secret sharing schemes based on Chinese remainder theoremRecursive constructions for perfect secret sharing schemesOn Linear Secret Sharing for Connectivity in Directed GraphsOptimal information ratio of secret sharing schemes on Dutch windmill graphsOn-line secret sharingExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationConditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and SeparationsProbabilistic secret sharingOn group-characterizability of homomorphic secret sharing schemesSecret-Sharing Schemes: A SurveyIdeal Secret Sharing Schemes for Useful Multipartite Access StructuresFully dynamic secret sharing schemesOn the information rate of secret sharing schemesLower bounds for monotone span programsSecure computation without computersImproved upper bounds for the information rates of the secret sharing schemes induced by the Vámos matroidAn ideal multi-secret sharing scheme based on MSPA general approach to robust web meteringOptimal assignment schemes for general access structures based on linear programmingSecret sharing schemes with three or four minimal qualified subsetsSecret sharing schemes on access structures with intersection number equal to oneSharing multiple secrets: Models, schemes and analysisQuantum strongly secure ramp secret sharingHow to share a secretOptimal complexity of secret sharing schemes with four minimal qualified subsetsUnnamed ItemOn secret sharing schemes, matroids and polymatroidsReduced access structures with four minimal qualified subsets on six participantsMatroids Can Be Far from Ideal Secret SharingThe communication complexity of private simultaneous messages, revisitedPlacing conditional disclosure of secrets in the communication complexity universeIdeal secret sharing schemes whose minimal qualified subsets have at most three participantsOn abelian and homomorphic secret sharing schemesThe Latin squares and the secret sharing schemesA lower bound on the encoding length in lossy transmissionGeneral information dispersal algorithmsSecret Sharing Schemes for Dense Forbidden GraphsHypergraph decomposition and secret sharingOn the optimization of bipartite secret sharing schemesIdeal Hierarchical Secret Sharing SchemesUnnamed ItemAn impossibility result on graph secret sharingStrongly secure ramp secret sharing schemes for general access structuresGraph decompositions and secret sharing schemesON THE DEALER'S RANDOMNESS REQUIRED IN PERFECT SECRET SHARING SCHEMES WITH ACCESS STRUCTURES OF CONSTANT RANKLower bounds on the information rate of secret sharing schemes with homogeneous access structure.General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-VotingRandomness in distribution protocolsProbability of shares in secret sharing schemesWeighted decomposition construction for perfect secret sharing schemes




Cites Work




This page was built for publication: On the size of shares for secret sharing schemes