Error correcting and complexity aspects of linear secret sharing schemes
From MaRDI portal
Publication:3404418
Recommendations
Cited in
(6)- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- New secret sharing scheme based on linear code
- Improving the linear programming technique in the search for lower bounds in secret sharing
- Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
- Finding lower bounds on the complexity of secret sharing schemes by linear programming
- Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming
This page was built for publication: Error correcting and complexity aspects of linear secret sharing schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3404418)