Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. J. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, LNCS 403, Advances in Cryptology, Proceedings of Crypto'88, Springer Verlag, pp. 27–36, 1990.
2. G. Blakley, Safeguarding cryptographic keys, Proceedings of AFIPS 1979 National Computer Conference, vol. 48, 1979, pp. 313–317.
3. G. Blakley and G. Kabatianski, On general perfect secret sharing schemes, LNCS 963, Advances in Cryptology, Proceedings of Crypto'95, Springer Verlag, pp. 367–371, 1995
4. E. Brickell and D. Davenport, On the classification of ideal secret sharing schemes, Journal of Cryptology, vol. 4, 1991, pp. 123–134.
5. L. Csirmaz, The size of a share must be large, LNCS 950, Advances in Cryptology, Proceedings of Eurocrypt'94, Springer Verlag, pp. 13–22, 1994.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献