An Explication of Secret Sharing Schemes with General Access Structure (original) (raw)
Related papers
Lecture Notes in Computer Science, 1994
Secret sharing scheme realizing general access structure
Electronics and Communications in Japan (Part III: Fundamental Electronic Science)
New secret sharing scheme for multipartite access structures with threshold changeability
2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension
Sakibur Rahman, Shinsaku Kiyomoto
Mutually Trusted Authority-Free Secret Sharing Schemes
Journal of Cryptology, 1997
A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing
On secret sharing schemes with extended capabilities
2002
Ideal Secret Sharing Schemes with Share Selectability
Lecture Notes in Computer Science, 2011
Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract)
Eurocrypt, 1995
Weighted threshold secret sharing based on the Chinese remainder theorem
2005
An ideal hierarchical secret sharing scheme
ArXiv, 2020
International Journal of Advance Engineering and Research Development, 2016
Redistributing secret shares to new access structures and its applications
1997
Secret sharing schemes and combinatorial designs
1993
Multiple assignment scheme for sharing secret
Journal of Cryptology, 1993
Secret Sharing Schemes Threshold Determination
2015
Efficient Secret Sharing Without a Mutually Trusted Authority
Lecture Notes in Computer Science, 1995
An improved secret sharing scheme based on ( K,N ) threshold
International Journal Foundation
Advance Research Journal of Multidisciplinary Discoveries, 2019
Hash function-based secret sharing scheme designs
Security and Communication Networks, 2012
On the Size of Shares for Secret Sharing Schemes
1991
Characterizing Ideal Weighted Threshold Secret Sharing
Analyzing Extended Secret Sharing Schemes based on Share Size
International Journal of Computer Applications, 2015
Consideration for multi-threshold multi-secret sharing schemes
International Symposium on Information Theory and Applications (ISITA 2012)
Compounding secret sharing schemes
Secret sharing system using (k, L, n) threshold scheme
Electronics and Communications in Japan (Part I: Communications), 1986
Remarks on the multiple assignment secret sharing scheme
Lecture Notes in Computer Science, 1997
Threshold changeable secret sharing schemes revisited
Theoretical Computer Science, 2012
Unchanged Shadow-based Secret Sharing Scheme
1995
A general decomposition construction for incomplete secret sharing schemes
1998
Anonymous secret sharing schemes
Discrete Applied Mathematics, 1997
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures
The Computer Journal, 1999
On construction of cumulative secret sharing schemes
Lecture Notes in Computer Science, 1998
2011
Threshold Secret Sharing Scheme for Compartmented Access Structures
International Journal of Information Security and Privacy, 2016
A NOVEL WAY OF VERIFIABLE REDISTRIBUTION OF THE SECRET IN A MULTIUSER ENVIRONMENT USING GROUP KEY