| Publication | Date of Publication | Type |
|---|
Improved polynomial secret-sharing schemes | 2024-08-02 | Paper |
One-out-of-\(q\) OT combiners IEEE Transactions on Information Theory | 2024-07-22 | Paper |
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures IEEE Transactions on Information Theory | 2022-05-30 | Paper |
The share size of secret-sharing schemes for almost all access structures and graphs | 2022-03-23 | Paper |
Privacy-preserving data splitting: a combinatorial approach Designs, Codes and Cryptography | 2021-06-24 | Paper |
Secret sharing schemes for ports of matroids of rank 3. Kybernetika | 2021-04-13 | Paper |
Common information, matroid representation, and secret sharing for matroid ports Designs, Codes and Cryptography | 2021-01-25 | Paper |
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing IEEE Transactions on Information Theory | 2020-12-04 | Paper |
Secret-sharing schemes for general and uniform access structures | 2020-02-04 | Paper |
Self-enforcing protocols via co-utile reputation management Information Sciences | 2020-01-06 | Paper |
Local bounds for the optimal information ratio of secret sharing schemes Designs, Codes and Cryptography | 2019-05-24 | Paper |
Improving the linear programming technique in the search for lower bounds in secret sharing | 2018-07-09 | Paper |
Linear secret-sharing schemes for forbidden graph access structures | 2018-01-19 | Paper |
Resource-efficient OT combiners with active security | 2018-01-19 | Paper |
On the information ratio of non-perfect secret sharing schemes Algorithmica | 2018-01-05 | Paper |
Ideal Hierarchical Secret Sharing Schemes IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts IEEE Transactions on Computers | 2017-05-16 | Paper |
Natural Generalizations of Threshold Secret Sharing IEEE Transactions on Information Theory | 2017-05-16 | Paper |
Secret sharing schemes for dense forbidden graphs Lecture Notes in Computer Science | 2016-10-21 | Paper |
Recent advances in non-perfect secret sharing schemes Pursuit of the Universal | 2016-08-17 | Paper |
Generalization-based privacy preservation and discrimination prevention in data publishing and mining Data Mining and Knowledge Discovery | 2016-08-04 | Paper |
Secret-sharing schemes for very dense graphs Journal of Cryptology | 2016-06-01 | Paper |
Extending Brickell-Davenport theorem to non-perfect secret sharing schemes Designs, Codes and Cryptography | 2015-02-19 | Paper |
Optimal non-perfect uniform secret sharing schemes Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Linear spaces and transversal designs: \(k\)-anonymous combinatorial configurations for anonymous database search notes Designs, Codes and Cryptography | 2014-04-29 | Paper |
Provably secure threshold public-key encryption with adaptive security and short ciphertexts Information Sciences | 2012-10-25 | Paper |
Linear threshold multisecret sharing schemes Information Processing Letters | 2012-10-23 | Paper |
Secret sharing schemes for very dense graphs Lecture Notes in Computer Science | 2012-09-25 | Paper |
Ideal multipartite secret sharing schemes Journal of Cryptology | 2012-07-10 | Paper |
TTP smartcard-based ElGamal cryptosystem using threshold scheme for electronic elections Foundations and Practice of Security | 2012-06-08 | Paper |
On the optimization of bipartite secret sharing schemes Designs, Codes and Cryptography | 2012-03-23 | Paper |
Bridging broadcast encryption and group key agreement Lecture Notes in Computer Science | 2011-12-02 | Paper |
Natural generalizations of threshold secret sharing Lecture Notes in Computer Science | 2011-12-02 | Paper |
Ideal secret sharing schemes for useful multipartite access structures Lecture Notes in Computer Science | 2011-06-08 | Paper |
Linear threshold multisecret sharing schemes Lecture Notes in Computer Science | 2010-09-29 | Paper |
On the Optimization of Bipartite Secret Sharing Schemes Lecture Notes in Computer Science | 2010-09-29 | Paper |
Ideal hierarchical secret sharing schemes Theory of Cryptography | 2010-02-24 | Paper |
Ideal Multipartite Secret Sharing Schemes Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
A Note on Extension Properties and Representations of Matroids | N/A | Paper |