Author:
Feng Jen-Bang,Wu Hsien-Chu,Tsai Chwei-Shyong,Chu Yen-Ping
Subject
Hardware and Architecture,Information Systems,Software
Reference10 articles.
1. Benaloh, J., Leichter, J., 1989. Generalized secret sharing and monotone functions. In: Advances in Cryptology—CRYPTO ’88, vol. 403, Springer-Verlag, Berlin, pp. 27–35
2. Blakley, G.R., 1979. Safeguarding Cryptography Keys. Proceedings of AFIPS 1979 National Computer Conference, Volume 48, New York, USA, June 4–7, pp. 313–317
3. Lower bounds for robust secret sharing schemes;Blundo;Information Processing Letters,1997
4. Sharing one secret vs. sharing many secrets;Crescenzo;Theoretical Computer Science,2003
5. How to share a secret;Shamir;Communication of the ACM,1979
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献