Author:
Blakley Bob,Blakley G. R.,Chan A. H.,Massey J. L.
Publisher
Springer Berlin Heidelberg
Reference9 articles.
1. G.R. Blakley, Safeguarding Cryptographic Keys. Proceedings AFIPS 1979 Nat. Computer Conf. 48 (1979) 313–317
2. E.G. Brickell and D.R. Stinson, oral communication.
3. M. De Soete and K. Vedder, Some New Classes of Geometric Threshold Schemes, Proceedings EUROCRYPT 88 (1988).
4. E.D. Karnin, J.W. Greene and M.E. Hellman, On Secret Sharing Systems, IEEE Trans. on Information Theory, IT-29 (1983), 35–41
5. K.M. Martin, Untrustworthy Participants in Perfect Secret Sharing Schemes, preprint
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Incremental Threshold Scheme Enabled IoT Group Key Management;2023 7th Cyber Security in Networking Conference (CSNet);2023-10-16
2. Timed-release computational secret sharing and threshold encryption;Designs, Codes and Cryptography;2017-01-20
3. Shatter;Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks;2016-07-18
4. Secret Image Sharing Scheme with Threshold Changeable Capability;Mathematical Problems in Engineering;2016
5. Information-theoretically Secure Timed-release Secret Sharing Schemes;Journal of Information Processing;2016