Recent advances in non-perfect secret sharing schemes
From MaRDI portal
Publication:3188243
Recommendations
Cites work
- scientific article; zbMATH DE number 4179276 (Why is no real title available?)
- scientific article; zbMATH DE number 107482 (Why is no real title available?)
- scientific article; zbMATH DE number 1023999 (Why is no real title available?)
- scientific article; zbMATH DE number 1024083 (Why is no real title available?)
- scientific article; zbMATH DE number 1149914 (Why is no real title available?)
- scientific article; zbMATH DE number 1394291 (Why is no real title available?)
- Atomic Secure Multi-party Multiplication with Low Communication
- Bounds on the Threshold Gap in Secret Sharing and its Applications
- Extending Brickell-Davenport theorem to non-perfect secret sharing schemes
- How to share a secret
- Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
- Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications
- Lossy chains and fractional secret sharing
- On secret sharing schemes, matroids and polymatroids
- On the classification of ideal secret sharing schemes
- Optimal non-perfect uniform secret sharing schemes
- Optimum general threshold secret sharing
- Polymatroidal dependence structure of a set of random variables
- Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes
- Secret-Sharing Schemes: A Survey
- Secure Computation from Random Error Correcting Codes
- Security of Ramp Schemes
- Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves
- The size of a share must be large
Cited in
(6)- On the information ratio of non-perfect secret sharing schemes
- Recent advances in function and homomorphic secret sharing (invited talk)
- Secret sharing schemes with general access structures
- Cutting-edge cryptography through the lens of secret sharing
- scientific article; zbMATH DE number 1394291 (Why is no real title available?)
- Optimal non-perfect uniform secret sharing schemes
This page was built for publication: Recent advances in non-perfect secret sharing schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3188243)