scientific article; zbMATH DE number 4179276
From MaRDI portal
Recommendations
Cited in
(only showing first 100 items - show all)- Timed-release computational secret sharing and threshold encryption
- Ideal secret sharing schemes for useful multipartite access structures
- On Boolean functions derived from linear maps over \(\mathbb{Z}_4\) and their application to secret sharing
- CDS composition of multi-round protocols
- Secret sharing with certified deletion
- Capturing one-way functions via NP-hardness of meta-complexity
- Succinct computational secret sharing
- Sharing one secret vs. sharing many secrets.
- Restricted adaptive oblivious transfer
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
- A remark on hierarchical threshold secret sharing
- Quantum secret sharing for general access structures based on multiparticle entanglements
- Optimum general threshold secret sharing
- Recursive constructions for perfect secret sharing schemes
- Protecting data privacy in private information retrieval schemes
- General constructions for information-theoretic private information retrieval
- A scheme for threshold multi-secret sharing
- Computing Functions of a Shared Secret
- Mapping enlargements preserving identification property
- Shared generation of pseudo-random functions
- Secret-Sharing Schemes: A Survey
- Establishment of ad-hoc communities through policy-based cryptography
- A fully dynamic multi-secret sharing scheme with redundant authorization
- Secret sharing schemes for compartmented access structures
- General secret sharing based on the Chinese remainder theorem with applications in e-voting
- Local bounds for the optimal information ratio of secret sharing schemes
- A fully dynamic secret sharing scheme
- Partitioned encryption and achieving simultaneity by partitioning
- A perfect secret sharing scheme for general access structures
- Monotone circuits for monotone weighted threshold functions
- Efficient robust secret sharing from expander graphs
- Adaptive extractors and their application to leakage resilient secret sharing
- How to fairly reconstruct a shared secret
- Threshold schemes with weights
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\)
- Rational quantum secret sharing scheme based on GHZ state
- Probabilistic secret sharing
- Optimal information ratio of secret sharing schemes on Dutch windmill graphs
- Matroids Can Be Far from Ideal Secret Sharing
- FROST: Flexible round-optimized Schnorr threshold signatures
- Methods of encrypting monotonic access structures
- Threshold Secret Sharing Requires a Linear Size Alphabet
- Remarks on the classical threshold secret sharing schemes
- scientific article; zbMATH DE number 1962157 (Why is no real title available?)
- Secret sharing for mNP: completeness results
- Finding the maximal adversary structure from any given access structure
- Weighted decomposition construction for perfect secret sharing schemes
- On Linear Secret Sharing for Connectivity in Directed Graphs
- Secret sharing schemes for infinite sets of participants: a new design technique
- On-line secret sharing
- On the information ratio of non-perfect secret sharing schemes
- ACE with compact ciphertext size and decentralized sanitizers
- Traceability codes and their generalizations
- Optimal complexity of secret sharing schemes with four minimal qualified subsets
- Rearrangements of access structures and their realizations in secret sharing schemes
- Secret sharing schemes with general access structures
- Escrow-free encryption supporting cryptographic workflow
- Cutting-edge cryptography through the lens of secret sharing
- On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate
- Adaptively secure distributed PRFs from LWE
- Towards breaking the exponential barrier for general secret sharing
- Secret sharing schemes for graph-based prohibited structures
- Cutting-edge cryptography through the lens of secret sharing
- Secret-sharing schemes for very dense graphs
- Randomness in secret sharing and visual cryptography schemes
- Quadratic secret sharing and conditional disclosure of secrets
- Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)
- Combinatorial constructions of repairable ramp schemes
- Secure publicly verifiable and proactive secret sharing schemes with general access structure
- Ideal multipartite secret sharing schemes
- Ideal homomorphic secret sharing schemes over cyclic groups
- All inequalities for the relative entropy
- Recent advances in non-perfect secret sharing schemes
- LERNA: secure single-server aggregation via key-homomorphic masking
- Lower bounds for monotone span programs
- On the information rate of secret sharing schemes
- An ideal multi-secret sharing scheme based on MSP
- Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures
- An efficient construction of perfect secret sharing schemes for graph-based structures
- On the classification of ideal secret sharing schemes
- Asymmetric distributed trust
- Improved fully adaptive decentralized MA-ABE for NC1 from MDDH
- Fully adaptive decentralized multi-authority \textsf{ABE}
- Secret sharing schemes on general access structures.
- Secret sharing schemes for dense forbidden graphs
- Strongly ideal secret sharing schemes
- Ideal secret sharing schemes whose minimal qualified subsets have at most three participants
- Generalized Secret Sharing Schemes Using N$$^\mu $$MDS Codes
- Hypergraph decomposition and secret sharing
- On ASGS framework: general requirements and an example of implementation
- An explication of secret sharing schemes
- Some improved bounds on the information rate of perfect secret sharing schemes
- Secret sharing schemes for ports of matroids of rank 3.
- Secret-sharing for NP
- Key derivation algorithms for monotone access structures in cryptographic file systems
- How to recover a secret with \(O(n)\) additions
- On the size of shares for secret sharing schemes
- Secret sharing based on a hard-on-average problem
- Randomness recoverable secret sharing schemes
- Realizing secret sharing with general access structure
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3202940)