Ideal secret sharing schemes from permutations

被引:0
|
作者
Pieprzyk, Josef [1 ]
Zhang, Xian-Mo [1 ]
机构
[1] Department of Computing, Macquarie University, Sydney, NSW 2109, Australia
关键词
11;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:238 / 244
相关论文
共 50 条
  • [31] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [32] On identification secret sharing schemes
    Cai, N
    Lam, KY
    INFORMATION AND COMPUTATION, 2003, 184 (02) : 298 - 310
  • [33] On Proactive Secret Sharing Schemes
    Nikov, V
    Nikova, S
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 308 - 325
  • [34] Secret sharing schemes on graphs
    Csirmaz, Laszlo
    STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2007, 44 (03) : 297 - 306
  • [35] PERFECT SECRET SHARING SCHEMES
    Parvatov, K. G.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 50 - 57
  • [36] Partial Secret Sharing Schemes
    Jafari, Amir
    Khazaei, Shahram
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5364 - 5385
  • [37] Efficient Secret Sharing Schemes
    Lv, Chunli
    Jia, Xiaoqi
    Lin, Jingqiang
    Jing, Jiwu
    Tian, Lijun
    Sun, Mingli
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 114 - +
  • [38] Anonymous secret sharing schemes
    Blundo, C
    Stinson, DR
    DISCRETE APPLIED MATHEMATICS, 1997, 77 (01) : 13 - 28
  • [39] Matroids can be far from ideal secret sharing
    Beimel, Amos
    Livne, Noam
    Padro, Carles
    THEORY OF CRYPTOGRAPHY, 2008, 4948 : 194 - +
  • [40] Explication of secret sharing schemes
    Stinson, D.R.
    Designs, Codes, and Cryptography, 1992, 2 (04)