On secret sharing systems
From MaRDI portal
Publication:4739795
DOI10.1109/TIT.1983.1056621zbMATH Open0503.94018WikidataQ28015699 ScholiaQ28015699MaRDI QIDQ4739795FDOQ4739795
Authors: Ehud D. Karnin, Jonathan W. Greene, Martin Edward Hellman
Publication date: 1983
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Recommendations
secret sharing systempolynomial interpolation methoddeterministic probabilistic methodlinear coding scheme
Cited In (only showing first 100 items - show all)
- Matroids Can Be Far from Ideal Secret Sharing
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
- A note on dynamic threshold schemes
- Title not available (Why is that?)
- An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme
- Weighted decomposition construction for perfect secret sharing schemes
- Title not available (Why is that?)
- On the information ratio of non-perfect secret sharing schemes
- Optimal complexity of secret sharing schemes with four minimal qualified subsets
- Title not available (Why is that?)
- Secret sharing schemes with partial broadcast channels
- Improved upper bounds for the information rates of the secret sharing schemes induced by the Vámos matroid
- Title not available (Why is that?)
- Combinatorial lower bounds for secret sharing schemes
- Summing over a network without revealing summands
- Secret-sharing schemes for very dense graphs
- Title not available (Why is that?)
- Title not available (Why is that?)
- On secret sharing schemes
- Public Key Cryptography - PKC 2006
- On secret set schemes
- Ideal multipartite secret sharing schemes
- Title not available (Why is that?)
- Lower bounds for monotone span programs
- On the information rate of secret sharing schemes
- Fully dynamic secret sharing schemes
- An ideal multi-secret sharing scheme based on MSP
- Multiple assignment scheme for sharing secret
- Multipartite secret sharing by bivariate interpolation
- On ideal homomorphic secret sharing schemes and their decomposition
- On proper secrets, \((t,k)\)-bases and linear codes
- On secret sharing protocols
- Ideal secret sharing schemes whose minimal qualified subsets have at most three participants
- Hypergraph decomposition and secret sharing
- An explication of secret sharing schemes
- Linear threshold multisecret sharing schemes
- On the size of shares for secret sharing schemes
- Linear multi-secret sharing schemes based on multi-party computation
- Shared secret reconstruction
- On the bound for anonymous secret sharing schemes
- Strong security of linear ramp secret sharing schemes with general access structures
- Title not available (Why is that?)
- Probability of shares in secret sharing schemes
- Title not available (Why is that?)
- Verifiable quantum \((k,n)\)-threshold secret key sharing
- Sharing multiple secrets: Models, schemes and analysis
- Cheating-immune secret sharing schemes from codes and cumulative arrays
- Graph decompositions and secret sharing schemes
- Ideal hierarchical secret sharing schemes
- A perfect threshold secret sharing scheme to identify cheaters
- Generation of key predistribution schemes using secret sharing schemes
- Secret sharing schemes with applications in security protocols
- Secret sharing and duality
- A modular approach to key safeguarding
- How to share a secret
- Strongly secure ramp secret sharing schemes for general access structures
- A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
- Several Generalizations of Shamir's Secret Sharing Scheme
- How to share a secret
- A lower bound on the encoding length in lossy transmission
- Recursive constructions for perfect secret sharing schemes
- SHARING SECRETS USING ELEMENTARY CELLULAR AUTOMATA
- On secret sharing schemes, matroids and polymatroids
- General constructions for information-theoretic private information retrieval
- A (2, n)-SECRET SHARING SCHEME BASED ON LINEAR CELLULAR AUTOMATA
- Title not available (Why is that?)
- Error-correcting codes and cryptography
- A new secret sharing scheme
- Secret-Sharing Schemes: A Survey
- Secret Swarm Unit Reactive k −Secret Sharing
- General secret sharing based on the Chinese remainder theorem with applications in e-voting
- On-line secret sharing
- Randomness in distribution protocols
- Secure computation without computers
- Multisecret-sharing schemes and bounded distance decoding of linear codes
- Two new classes of projective two-weight linear codes
- Bounds And Constructions For Threshold Shared Generation Of Authenticators
- On identification secret sharing schemes.
- Secure two-party computation: a visual way
- A dynamic secret sharing scheme with cheater detection
- A nonlinear secret sharing scheme
- A geometric characterization of minimal codes and their asymptotic performance
- On Linear Secret Sharing for Connectivity in Directed Graphs
- Key-policy attribute-based encryption for Boolean circuits from bilinear maps
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- General information dispersal algorithms
- Cutting-edge cryptography through the lens of secret sharing
- On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate
- Ideal ramp schemes and related combinatorial objects
- A simple primal-dual approximation algorithm for 2-edge-connected spanning subgraphs
- Developing a multiple secret sharing scheme by residue number system
- Some democratic secret sharing schemes
- On secret sharing communication systems with two or three channels
- Ideal homomorphic secret sharing schemes over cyclic groups
- A new approach to construct secret sharing schemes based on field extensions
- Homomorphic extensions of CRT-based secret sharing
- Multi-recipient and threshold encryption based on hidden multipliers
- Introduction to secret-sharing
- Improvement of assurance including security for wireless sensor networks using dispersed data transmission
- A state-tree based \((t,n)\) secret sharing scheme
This page was built for publication: On secret sharing systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4739795)