scientific article; zbMATH DE number 4195886

From MaRDI portal
Publication:5202624

zbMath0724.94011MaRDI QIDQ5202624

Ernest F. Brickell

Publication date: 1990


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (27)

Discrete modulation continuous variable quantum secret sharingZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher callsSecret Sharing for mNP: Completeness ResultsAlgebraic secret sharing using privacy homomorphisms for IoT-based healthcare systemsAlgebraic geometric secret sharing schemes over large fields are asymptotically thresholdCryptographic algorithms for privacy-preserving online applicationsDynamic hierarchical quantum secret sharing with general access structureDynamic and Verifiable Hierarchical Secret SharingHierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and RobustnessHomomorphic extensions of CRT-based secret sharingRational quantum secret sharing scheme based on GHZ stateConstructing ideal secret sharing schemes based on Chinese remainder theoremAn ID-based signcryption scheme with compartmented secret sharing for unsigncryptionIncidence structures applied to cryptographyFinding the maximal adversary structure from any given access structureAdmissible tracks in Lai-Ding's secret sharing schemeOptimal assignment schemes for general access structures based on linear programmingHow to share a secretTightly coupled multi-group threshold secret sharing based on Chinese remainder theoremСхема разделения секрета типа схемы Блэкли, основанная на пересечении подпространствA linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing schemeBlocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage systemSecret-sharing with a class of ternary codesGeneral Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-VotingA Key Sharing Scheme over GF(25) to Use in ECCHierarchical and dynamic threshold Paillier cryptosystem without trusted dealerPractical (fully) distributed signatures provably secure in the standard model




This page was built for publication: