An Explication of Secret Sharing Schemes with General Access Structure (original) (raw)

Multi-Secret Sharing Schemes

Giovanni Di Crescenzo

Lecture Notes in Computer Science, 1994

View PDFchevron_right

Secret sharing scheme realizing general access structure

Takao Nishizeki

Electronics and Communications in Japan (Part III: Fundamental Electronic Science)

View PDFchevron_right

New secret sharing scheme for multipartite access structures with threshold changeability

Appala Tentu

2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015

View PDFchevron_right

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension

Sakibur Rahman, Shinsaku Kiyomoto

View PDFchevron_right

Mutually Trusted Authority-Free Secret Sharing Schemes

Keith Martin

Journal of Cryptology, 1997

View PDFchevron_right

A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing

Gwoboa Horng

View PDFchevron_right

On secret sharing schemes with extended capabilities

Zbigniew Kotulski

2002

View PDFchevron_right

Ideal Secret Sharing Schemes with Share Selectability

Masakazu Soshi

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract)

Keith Martin

Eurocrypt, 1995

View PDFchevron_right

Weighted threshold secret sharing based on the Chinese remainder theorem

Ioana Boureanu

2005

View PDFchevron_right

An ideal hierarchical secret sharing scheme

BOUROUBI sadek

ArXiv, 2020

View PDFchevron_right

A Survey: Secret Sharing

Ankit Chouhan

International Journal of Advance Engineering and Research Development, 2016

View PDFchevron_right

Redistributing secret shares to new access structures and its applications

Sushil Jajodia

1997

View PDFchevron_right

Secret sharing schemes and combinatorial designs

유진 송

1993

View PDFchevron_right

Multiple assignment scheme for sharing secret

Takao Nishizeki

Journal of Cryptology, 1993

View PDFchevron_right

Secret Sharing Schemes Threshold Determination

Ricardo Custodio

2015

View PDFchevron_right

Efficient Secret Sharing Without a Mutually Trusted Authority

Keith Martin

Lecture Notes in Computer Science, 1995

View PDFchevron_right

An improved secret sharing scheme based on ( K,N ) threshold

International Journal Foundation

Advance Research Journal of Multidisciplinary Discoveries, 2019

View PDFchevron_right

Hash function-based secret sharing scheme designs

Chum Chum

Security and Communication Networks, 2012

View PDFchevron_right

On the Size of Shares for Secret Sharing Schemes

Luisa Gargano

1991

View PDFchevron_right

Characterizing Ideal Weighted Threshold Secret Sharing

BEN TASSA

View PDFchevron_right

Analyzing Extended Secret Sharing Schemes based on Share Size

SONALI PATIL

International Journal of Computer Applications, 2015

View PDFchevron_right

Consideration for multi-threshold multi-secret sharing schemes

Masakazu Soshi

International Symposium on Information Theory and Applications (ISITA 2012)

View PDFchevron_right

Compounding secret sharing schemes

Edgar Martinez-Moro

View PDFchevron_right

Secret sharing system using (k, L, n) threshold scheme

Hirosuke Yamamoto

Electronics and Communications in Japan (Part I: Communications), 1986

View PDFchevron_right

Remarks on the multiple assignment secret sharing scheme

Rei Safavi-naini

Lecture Notes in Computer Science, 1997

View PDFchevron_right

Threshold changeable secret sharing schemes revisited

Yeow Meng Chee

Theoretical Computer Science, 2012

View PDFchevron_right

Unchanged Shadow-based Secret Sharing Scheme

Nur Hadisukmana

1995

View PDFchevron_right

A general decomposition construction for incomplete secret sharing schemes

Keith Martin

1998

View PDFchevron_right

Anonymous secret sharing schemes

Carlo Blundo

Discrete Applied Mathematics, 1997

View PDFchevron_right

Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures

Huaxiong Wang

The Computer Journal, 1999

View PDFchevron_right

On construction of cumulative secret sharing schemes

Huaxiong Wang

Lecture Notes in Computer Science, 1998

View PDFchevron_right

Generalized secret sharing

Alexander Dibert

2011

View PDFchevron_right

Threshold Secret Sharing Scheme for Compartmented Access Structures

Dr.P.Arockia Jansi Rani

International Journal of Information Security and Privacy, 2016

View PDFchevron_right

A NOVEL WAY OF VERIFIABLE REDISTRIBUTION OF THE SECRET IN A MULTIUSER ENVIRONMENT USING GROUP KEY

eSAT Journals

View PDFchevron_right