Universally ideal secret-sharing schemes

From MaRDI portal
Revision as of 02:44, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4838633

DOI10.1109/18.335890zbMath0821.94025OpenAlexW2143656893MaRDI QIDQ4838633

Benny Chor, Amos Beimel

Publication date: 12 July 1995

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/18.335890




Related Items (25)

Secret-sharing schemes for very dense graphsMeasuring, simulating and exploiting the head concavity phenomenon in BKZThreshold Secret Sharing Requires a Linear Size AlphabetAlgebraic secret sharing using privacy homomorphisms for IoT-based healthcare systemsThe use of mathematical linguistic methods in creating secret sharing threshold algorithmsOn ideal and weakly-ideal access structuresHow to recover a secret with \(O(n)\) additionsIdeal uniform multipartite secret sharing schemesOptimal linear multiparty conditional disclosure of secrets protocolsOn Linear Secret Sharing for Connectivity in Directed GraphsSecret-Sharing Schemes: A SurveyIdeal Secret Sharing Schemes for Useful Multipartite Access StructuresOn ideal homomorphic secret sharing schemes and their decompositionLower bounds for monotone span programsOptimal assignment schemes for general access structures based on linear programmingSecret sharing schemes based on graphical codesClasses of matroids closed under minors and principal extensionsMatroids Can Be Far from Ideal Secret SharingSecret Sharing Schemes for Dense Forbidden GraphsRandomness in secret sharing and visual cryptography schemesUnnamed ItemIdeal homomorphic secret sharing schemes over cyclic groupsEfficient explicit constructions of compartmented secret sharing schemesMatroid representations by partitionsSecret sharing schemes for ports of matroids of rank 3







This page was built for publication: Universally ideal secret-sharing schemes