Fully dynamic secret sharing schemes
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 3908323 (Why is no real title available?)
- scientific article; zbMATH DE number 3912274 (Why is no real title available?)
- scientific article; zbMATH DE number 3614066 (Why is no real title available?)
- scientific article; zbMATH DE number 503323 (Why is no real title available?)
- scientific article; zbMATH DE number 708804 (Why is no real title available?)
- scientific article; zbMATH DE number 708830 (Why is no real title available?)
- scientific article; zbMATH DE number 721907 (Why is no real title available?)
- scientific article; zbMATH DE number 1088899 (Why is no real title available?)
- scientific article; zbMATH DE number 1088901 (Why is no real title available?)
- scientific article; zbMATH DE number 812038 (Why is no real title available?)
- scientific article; zbMATH DE number 1394307 (Why is no real title available?)
- scientific article; zbMATH DE number 1456816 (Why is no real title available?)
- scientific article; zbMATH DE number 3316587 (Why is no real title available?)
- A note on dynamic threshold schemes
- Advances in Cryptology - CRYPTO '92. 12th annual international cryptology conference, Santa Barbara, CA, USA, August 16-20, 1992. Proceedings
- An explication of secret sharing schemes
- Decomposition constructions for secret-sharing schemes
- How to share a secret
- On dynamic threshold schemes
- On secret sharing systems
- On the classification of ideal secret sharing schemes
- On the information rate of perfect secret sharing schemes
- On the size of shares for secret sharing schemes
- Probability of shares in secret sharing schemes
- Randomness in distribution protocols
- Some improved bounds on the information rate of perfect secret sharing schemes
- Tight bounds on the information rate of secret sharing schemes
Cited in
(18)- Dynamic vector space secret sharing based on certificates
- Dynamic secret sharing scheme without trusted center
- On secret sharing schemes
- On-line secret sharing
- On ASGS framework: general requirements and an example of implementation
- Threshold changeable secret sharing schemes revisited
- Secret Swarm Unit Reactive k −Secret Sharing
- A fully dynamic secret sharing scheme
- Communication-optimal proactive secret sharing for dynamic groups
- Rearrangements of access structures and their realizations in secret sharing schemes
- Combiner Driven Management Models and Their Applications
- Storing and retrieving secrets on a blockchain
- A fully dynamic multi-secret sharing scheme with redundant authorization
- Dynamic and verifiable hierarchical secret sharing
- Perennial secure multi-party computation of universal Turing machine
- Secret image sharing scheme with threshold changeable capability
- Dynamic Secrets in Communication Security
- Extensions of access structures and their cryptographic applications
This page was built for publication: Fully dynamic secret sharing schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q671527)