Recommendations
- A secret sharing scheme based on vector space
- Publicly verifiable secret sharing schemes in vector space
- Secret sharing scheme of secure vector space based on quadratic residue
- Publication:4272011
- Dynamic vector space secret sharing based on certificates
- Publication:4780272
- Nearly optimal robust secret sharing
- Lower bounds for robust secret sharing schemes
- Robust secret sharing schemes against local adversaries
Cites work
- scientific article; zbMATH DE number 4123667 (Why is no real title available?)
- scientific article; zbMATH DE number 1303145 (Why is no real title available?)
- scientific article; zbMATH DE number 774344 (Why is no real title available?)
- scientific article; zbMATH DE number 1394319 (Why is no real title available?)
- A perfect threshold secret sharing scheme to identify cheaters
- An explication of secret sharing schemes
- Decomposition constructions for secret-sharing schemes
- Detection of cheaters in vector space secret sharing schemes
- Graph decompositions and secret sharing schemes
- How to avoid the cheaters succeeding in the key sharing scheme
- How to share a secret
- How to share a secret with cheaters
- Lower bounds for robust secret sharing schemes
- Optimum Secret Sharing Scheme Secure against Cheating
- The Detection of Cheaters in Thershold Schemes
- Tight bounds on the information rate of secret sharing schemes
Cited in
(8)- Dynamic vector space secret sharing based on certificates
- Secret sharing schemes with detection of cheaters for a general access structure
- scientific article; zbMATH DE number 467267 (Why is no real title available?)
- Secret sharing scheme of secure vector space based on quadratic residue
- Lower bounds for robust secret sharing schemes
- scientific article; zbMATH DE number 5012233 (Why is no real title available?)
- Computationally secure robust multi-secret sharing for general access structure
- On the information ratio of non-perfect secret sharing schemes
This page was built for publication: Robust vector space secret sharing schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q293422)