Author:
Kurosawa Kaoru,Okada Koji,Sakano Keiichi,Ogata Wakaha,Tsujii Shigeo
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. G.R. Blakley: Safeguarding cryptographic keys. Proc. of the AFIPS 1979 National Computer Conference, vol.48, pp.313–317 (1979)
2. A. Shamir: How to share a secret. Communications of the ACM, 22,(11), pp.612–613 (1979)
3. M. Itoh, A. Saito, T. Nishizeki: Secret sharing scheme realizing general access structure. Proc. of IEEE Globecom’ 87, Tokyo, pp.99–102 (1987)
4. J.C. Benaloh, J. Leichter: Generalized secret sharing and monotone functions. Crypto’88, pp.27–36 (1990)
5. E.F. Brickell, D.M. Davenport: On the classification of ideal secret sharing schemes. Journal of Cryptology, vol.4, No.2, pp.123–134 (1991)
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献