scientific article; zbMATH DE number 553905
From MaRDI portal
Publication:4288075
Recommendations
Cited in
(17)- Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes
- Weighted decomposition construction for perfect secret sharing schemes
- A nonlinear secret sharing scheme
- Rearrangements of access structures and their realizations in secret sharing schemes
- More information theoretical inequalities to be used in secret sharing?
- Randomness in secret sharing and visual cryptography schemes
- Secret sharing schemes based on extension fields
- A new approach to construct secret sharing schemes based on field extensions
- On the information rate of secret sharing schemes
- Operations over linear secret sharing schemes
- An explication of secret sharing schemes
- Reduced access structures with four minimal qualified subsets on six participants
- Anonymous secret sharing schemes
- Optimal assignment schemes for general access structures based on linear programming
- On the information rate of perfect secret sharing schemes
- Graph decompositions and secret sharing schemes
- The access structure of some secret-sharing schemes
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4288075)