Communications of the ACM
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Generalized Secret Sharing and Monotone Functions
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient Secret Sharing Schemes Based on Unauthorized Subsets
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient Secret Sharing Schemes Based on Unauthorized Subsets
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Hi-index | 0.00 |
We propose two multiple assignment secret sharing schemes realizing general access structures. One is always more efficient than the secret sharing scheme proposed by Ito, Saito and Nishizeki [5] from the viewpoint of the number of shares distributed to each participant. The other is also always more efficient than the scheme I of [7].