Fully dynamic secret sharing schemes
From MaRDI portal
Publication:671527
DOI10.1016/0304-3975(96)00003-5zbMATH Open0872.68034OpenAlexW1980651618MaRDI QIDQ671527FDOQ671527
Authors: Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro
Publication date: 27 February 1997
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/0304-3975(96)00003-5
Recommendations
Cites Work
- Title not available (Why is that?)
- How to share a secret
- Title not available (Why is that?)
- On the classification of ideal secret sharing schemes
- Some improved bounds on the information rate of perfect secret sharing schemes
- An explication of secret sharing schemes
- On the size of shares for secret sharing schemes
- Probability of shares in secret sharing schemes
- On the information rate of perfect secret sharing schemes
- Decomposition constructions for secret-sharing schemes
- Title not available (Why is that?)
- On secret sharing systems
- Title not available (Why is that?)
- Tight bounds on the information rate of secret sharing schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO '92. 12th annual international cryptology conference, Santa Barbara, CA, USA, August 16-20, 1992. Proceedings
- On dynamic threshold schemes
- A note on dynamic threshold schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Randomness in distribution protocols
- Title not available (Why is that?)
Cited In (17)
- Perennial secure multi-party computation of universal Turing machine
- On-line secret sharing
- Rearrangements of access structures and their realizations in secret sharing schemes
- Extensions of access structures and their cryptographic applications
- On secret sharing schemes
- On ASGS framework: general requirements and an example of implementation
- Secret image sharing scheme with threshold changeable capability
- Storing and retrieving secrets on a blockchain
- Threshold changeable secret sharing schemes revisited
- Dynamic and verifiable hierarchical secret sharing
- Combiner Driven Management Models and Their Applications
- Dynamic Secrets in Communication Security
- Dynamic secret sharing scheme without trusted center
- Communication-optimal proactive secret sharing for dynamic groups
- Secret Swarm Unit Reactive k −Secret Sharing
- A fully dynamic secret sharing scheme
- Dynamic vector space secret sharing based on certificates
This page was built for publication: Fully dynamic secret sharing schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q671527)