Author:
Capocelli R. M.,De Santis A.,Gargano L.,Vaccaro U.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference17 articles.
1. J. C. Benaloh and J. Leichter, Generalized Secret Sharing and Monotone Functions, Proceedings of Crypto '88—Advances in Cryptology, Lecture Notes in Computer Science, vol. 403, S. Goldwasser, ed., Springer-Verlag, Berlin, 1990, pp. 27–35.
2. G. R. Blakley, Safeguarding Cryptographic Keys, Proceedings of AFIPS 1979 National Computer Conference, vol. 48, New York, June 1979, pp. 313–317.
3. G. R. Blakley and C. Meadows, Security of Ramp Schemes, Proceedings of Crypto '84—Advances in Cryptology, Lecture Notes in Computer Science, vol. 196, G. R. Blakley and D. Chaum, eds., Springer-Verlag, Berlin, 1985, pp. 411–431.
4. C. Blundo, A. De Santis, D. R. Stinson, and U. Vaccaro, Graph Decomposition and Secret Sharing Schemes, Proceedings of Eurocrypt '92—Advances in Cryptology, Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.
5. E. F. Brickell and D. M. Davenport, On the Classification of Ideal Secret Sharing Schemes, Journal of Cryptology, vol. 4, no. 2, 1991, pp. 123–134.
Cited by
165 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Randomness Recoverable Secret Sharing Schemes;Journal of Cryptology;2024-08-20
2. Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage;IEEE Transactions on Information Theory;2024-05
3. Bounds and Protocols for Graph-Based Distributed Secret Sharing;IEEE Transactions on Dependable and Secure Computing;2024-01
4. Partial Secret Sharing Schemes;IEEE Transactions on Information Theory;2023-08
5. Succinct Computational Secret Sharing;Proceedings of the 55th Annual ACM Symposium on Theory of Computing;2023-06-02