scientific article; zbMATH DE number 1394319
From MaRDI portal
Publication:4934735
zbMATH Open0951.94538MaRDI QIDQ4934735FDOQ4934735
Authors:
Publication date: 1 February 2000
Title of this publication is not available (Why is that?)
Cited In (18)
- Existence and non-existence results for strong external difference families
- Detection and identification of cheaters in \((t,n)\) secret sharing scheme
- Lower bounds for robust secret sharing schemes
- On the equivalence of authentication codes and robust (2, 2)-threshold schemes
- Some democratic secret sharing schemes
- Robust vector space secret sharing schemes
- Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
- On the information rate of secret sharing schemes
- Leakage Resilient Cheating Detectable Secret Sharing Schemes
- Graph decompositions and secret sharing schemes
- Properties and constraints of cheating-immune secret sharing schemes
- Nearly optimal robust secret sharing against rushing adversaries
- A perfect threshold secret sharing scheme to identify cheaters
- Ramp secret sharing with cheater identification in presence of rushing cheaters
- Cheating detectable threshold scheme against most powerful cheaters for long secrets
- Dynamic threshold secret reconstruction and its application to the threshold cryptography
- Threshold changeable secret sharing with secure secret reconstruction
- Efficient robust secret sharing from expander graphs
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4934735)