共 50 条
- [31] Ideal and perfect multi-secret sharing schemes whose access structure are Q3 [J]. 2012 8TH INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORKING TECHNOLOGY (ICCNT, INC, ICCIS AND ICMIC), 2012, : 21 - 25
- [32] Ideal secret sharing schemes with multipartite access structures [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2006, 153 (02): : 165 - 168
- [34] A Construction Method of Secret Sharing Schemes Based on Authorized Subsets [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 394 - 399
- [35] Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 3047 - 3051
- [36] Ideal homomorphic secret sharing schemes over cyclic groups [J]. Science in China Series E: Technological Sciences, 1998, 41 : 650 - 660
- [38] Ideal homomorphic secret sharing schemes over cyclic groups [J]. SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 1998, 41 (06): : 650 - 660
- [39] A Flaw in the Use of Minimal Defining Sets for Secret Sharing Schemes [J]. Designs, Codes and Cryptography, 2006, 40 : 225 - 236
- [40] Improvement of Information Rates for Specified Participants in General Secret Sharing Schemes [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,