Ideal secret sharing schemes from permutations

被引:0
|
作者
Pieprzyk, Josef [1 ]
Zhang, Xian-Mo [1 ]
机构
[1] Department of Computing, Macquarie University, Sydney, NSW 2109, Australia
关键词
11;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:238 / 244
相关论文
共 50 条
  • [21] Ideal Composite Modular Secret Sharing Schemes
    Shenets, N. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) : 798 - 802
  • [22] On the composition of matroids and ideal secret sharing schemes
    Ng, SL
    Walker, M
    DESIGNS CODES AND CRYPTOGRAPHY, 2001, 24 (01) : 49 - 67
  • [23] Ideal secret sharing schemes with multipartite access structures
    Ng, SL
    IEE PROCEEDINGS-COMMUNICATIONS, 2006, 153 (02): : 165 - 168
  • [24] Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    Iwamoto, Mitsugu
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 3047 - 3051
  • [25] Ideal homomorphic secret sharing schemes over cyclic groups
    刘木兰
    周展飞
    Science in China(Series E:Technological Sciences), 1998, (06) : 650 - 660
  • [26] Ideal homomorphic secret sharing schemes over cyclic groups
    Mulan Liu
    Zhanfei Zhou
    Science in China Series E: Technological Sciences, 1998, 41 : 650 - 660
  • [27] Ideal homomorphic secret sharing schemes over cyclic groups
    Liu, ML
    Zhou, ZF
    SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 1998, 41 (06): : 650 - 660
  • [28] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268
  • [29] Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures
    Pattipati, Dileep Kumar
    Tentu, Appala Naidu
    Venkaiah, V. Ch.
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 149 - 161
  • [30] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32