1 |
C. Blundo, A. Cresti, A. De Santis, L. Gargano, and U. Vaccaro, 'Fully Dynamic Secret Sharing Schemes,' Advances in Cryptology-CRYPTO'93 Lecture Notes in Computer Science, vol. 773, pp. 110-125, 1994
|
2 |
K. M. Martin, 'Untrustworthy Participants in Perfect Secret Sharing Schemes,' In Cryptology and Coding Ⅲ, pp. 255-264, 1993
|
3 |
H. Ghodsi, J. Pieprzyk, C. Charnes, and R. Safavi-Naini, 'Cyptosystems for Hierarchical Groups,' Information Security and Privacy - ACISP'96, Lecture Notes in Computer Science, pp. 275-286, 1996
DOI
ScienceOn
|
4 |
G. J. Simmons, 'How to (Really) Share a Secret,' Advances in Cryptology - Crypto'88, Lecture Notes in Computer Science, vol. 403, pp. 390-448, 1990
|
5 |
E. F. Brickell and D. R. Stinson, 'Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes,' Journal of Cryptology, vol. 5, pp. 153-166, 1992
DOI
|
6 |
D. R. Stinson, 'An Explication of Secret Sharing Schemes,' Designs, Codes and Cryptography, vol. 2, pp. 357-390, 1992
DOI
|
7 |
J. Benaloh and J. Leichter, 'Generalized Secret Sharing and Monotone Functions,' In Advances in Cryptology-CRYPTO'88, Lecture Notes in Computer Science, vol. 403, pp. 27-35, 1990
|
8 |
D. R. Stinson and S. A. Vanstone, 'A Combinational Approach to Threshold Schemes,' Advances in Cryptology - Proceedings of CRYPTO'87, vol. 293, pp. 330-339, 1988
|
9 |
G. J. Simmons, W. Jackson and K. Martin, 'The Geometry of Shared Secret Schemes,' Bulletin of the ICA, vol. 1, pp. 71-88, 1991
|
10 |
E. D. Karnin, J. W. Greene and M. E. Hellman, 'On Secret Sharing Systems,' IEEE Transactions on Information Theory, vol. IT-29, no. 1, pp. 35-41, 1983
|
11 |
H. Ghodosi, J. Pieprzyk, C. Charnes and R. Safavi-Naini, 'Secret Sharing in Hierarchical Groups,' Information and Communication Security - ICICS'97, Lecture Notes in Computer Science, vol. 1334, pp. 81-86, 1997
DOI
ScienceOn
|
12 |
G. J. Simmons, 'Prepositioned Shared Secret and/or Shared Control Schemes,' Advances in Cryptology - EUROCRYPT'89, Lecture Notes in Computer Science, vol. 434, pp. 436-467, 1990
|
13 |
A. Shamir, 'How to Share a Secret,' Communications of the ACM, vol. 22, pp. 612-613, 1979
DOI
ScienceOn
|
14 |
G. R. Blakley, 'Safeguarding Cryptographic Keys,' AFIPS Conference Proceedings, vol. 48, pp. 313-317, 1979
|