On secret sharing systems
From MaRDI portal
Publication:4739795
Recommendations
Cited in
(only showing first 100 items - show all)- Generation of key predistribution schemes using secret sharing schemes
- Secret sharing and duality
- On ideal and weakly-ideal access structures
- Secret sharing schemes with applications in security protocols
- A modular approach to key safeguarding
- How to share a secret
- Optimal linear secret sharing schemes for graph access structures on six participants
- Strongly secure ramp secret sharing schemes for general access structures
- A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
- Timed-release computational secret sharing and threshold encryption
- Ideal secret sharing schemes for useful multipartite access structures
- Several Generalizations of Shamir's Secret Sharing Scheme
- Practical Threshold Signatures with Linear Secret Sharing Schemes
- On Boolean functions derived from linear maps over \(\mathbb{Z}_4\) and their application to secret sharing
- How to share a secret
- New classes of codes over \(R_{q,p,m}=\mathbb{Z}_{p^m}[u_1, u_2, \dots , u_q]/ \langle u_i^2=0,u_iu_j=u_ju_i\rangle\) and their applications
- Succinct computational secret sharing
- A lower bound on the encoding length in lossy transmission
- Timed-release secret sharing schemes with information theoretic security
- Recursive constructions for perfect secret sharing schemes
- Set theoretical secret sharing scheme in relocation cipher
- On secret sharing schemes, matroids and polymatroids
- SHARING SECRETS USING ELEMENTARY CELLULAR AUTOMATA
- General constructions for information-theoretic private information retrieval
- Mapping enlargements preserving identification property
- A (2, n)-SECRET SHARING SCHEME BASED ON LINEAR CELLULAR AUTOMATA
- A new secret sharing scheme
- Error-correcting codes and cryptography
- A survey and refinement of repairable threshold schemes
- scientific article; zbMATH DE number 1095500 (Why is no real title available?)
- Ideal hierarchical secret sharing and lattice path matroids
- Extending Brickell-Davenport theorem to non-perfect secret sharing schemes
- Secret-Sharing Schemes: A Survey
- On-line secret sharing
- Secure computation without computers
- General secret sharing based on the Chinese remainder theorem with applications in e-voting
- Secret Swarm Unit Reactive k −Secret Sharing
- Randomness in distribution protocols
- First study for ramp secret sharing schemes through greatest common divisor of polynomials
- Standard \((k, n)\)-threshold hierarchical quantum secret sharing
- Two new classes of projective two-weight linear codes
- Multisecret-sharing schemes and bounded distance decoding of linear codes
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
- Matroids Can Be Far from Ideal Secret Sharing
- A note on dynamic threshold schemes
- On identification secret sharing schemes.
- Bounds And Constructions For Threshold Shared Generation Of Authenticators
- scientific article; zbMATH DE number 176545 (Why is no real title available?)
- An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme
- Secure two-party computation: a visual way
- A geometric characterization of minimal codes and their asymptotic performance
- Weighted decomposition construction for perfect secret sharing schemes
- On Linear Secret Sharing for Connectivity in Directed Graphs
- A dynamic secret sharing scheme with cheater detection
- A nonlinear secret sharing scheme
- scientific article; zbMATH DE number 1424185 (Why is no real title available?)
- On the information ratio of non-perfect secret sharing schemes
- Key-policy attribute-based encryption for Boolean circuits from bilinear maps
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Optimal complexity of secret sharing schemes with four minimal qualified subsets
- Secret sharing schemes with partial broadcast channels
- Improved upper bounds for the information rates of the secret sharing schemes induced by the Vámos matroid
- General information dispersal algorithms
- Combinatorial lower bounds for secret sharing schemes
- scientific article; zbMATH DE number 1024085 (Why is no real title available?)
- Cutting-edge cryptography through the lens of secret sharing
- On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate
- Summing over a network without revealing summands
- scientific article; zbMATH DE number 4179276 (Why is no real title available?)
- Secret-sharing schemes for very dense graphs
- Ideal ramp schemes and related combinatorial objects
- A simple primal-dual approximation algorithm for 2-edge-connected spanning subgraphs
- On secret sharing schemes
- Developing a multiple secret sharing scheme by residue number system
- On secret set schemes
- scientific article; zbMATH DE number 177621 (Why is no real title available?)
- Some democratic secret sharing schemes
- scientific article; zbMATH DE number 467267 (Why is no real title available?)
- Ideal multipartite secret sharing schemes
- Ideal homomorphic secret sharing schemes over cyclic groups
- On secret sharing communication systems with two or three channels
- Homomorphic extensions of CRT-based secret sharing
- Public Key Cryptography - PKC 2006
- Improvement of assurance including security for wireless sensor networks using dispersed data transmission
- A new approach to construct secret sharing schemes based on field extensions
- Introduction to secret-sharing
- scientific article; zbMATH DE number 2149833 (Why is no real title available?)
- Multi-recipient and threshold encryption based on hidden multipliers
- Lower bounds for monotone span programs
- On the information rate of secret sharing schemes
- An ideal multi-secret sharing scheme based on MSP
- Fully dynamic secret sharing schemes
- A state-tree based \((t,n)\) secret sharing scheme
- Blakley type secret sharing scheme based on the intersection of subspaces
- New secret sharing scheme based on linear code
- Multiple assignment scheme for sharing secret
- Multipartite secret sharing by bivariate interpolation
- On proper secrets, (t,k)-bases and linear codes
- On ideal homomorphic secret sharing schemes and their decomposition
- Analysis of secret sharing schemes based on Nielsen transformations
This page was built for publication: On secret sharing systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4739795)