Author:
Liu Jian,Mesnager Sihem,Chen Lusheng
Publisher
Springer International Publishing
Reference34 articles.
1. Lecture Notes in Computer Science;A Beimel,2011
2. Lecture Notes in Computer Science;JC Benaloh,1990
3. Benaloh, J.: General linear secret sharing (extended abstract). http://research.microsoft.com/pubs/68477/glss.ps
4. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp. 1–10. ACM, New York (1988)
5. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, pp. 313–317. AFIPS Press, New York (1979)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. How to Compartment Secrets;Information Security Theory and Practice;2020
2. Generalized Secret Sharing Scheme Based on MDS Codes;ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management;2019-06-28
3. RASSS: a hijack‐resistant confidential information management scheme for distributed systems;IET Computers & Digital Techniques;2019-01-28
4. Secret sharing schemes for compartmented access structures;Cryptography and Communications;2016-09-20