Perfect Secret Sharing Schemes on Five Participants
Designs, Codes and Cryptography
A Construction for Multisecret Threshold Schemes
Designs, Codes and Cryptography
Sharing one secret vs. sharing many secrets: tight bounds on the average improvement ratio
SODA '00 Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
ISW '99 Proceedings of the Second International Workshop on Information Security
ISW '00 Proceedings of the Third International Workshop on Information Security
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Secret Sharing in Graph-Based Prohibited Structures
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Linear threshold multisecret sharing schemes
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
An ideal multi-secret sharing scheme based on MSP
Information Sciences: an International Journal
New methods to construct cheating immune multisecret sharing scheme
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Linear threshold multisecret sharing schemes
Information Processing Letters
Hi-index | 0.00 |