A protocol to set up shared secret schemes without the assistance of mutually trusted party
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A signature with shared verification scheme
CRYPTO '89 Proceedings on Advances in cryptology
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Designs, Codes and Cryptography
Detection of Cheaters in Vector Space Secret Sharing Schemes
Designs, Codes and Cryptography
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
Designs, Codes and Cryptography
Changing Thresholds in the Absence of Secure Channels
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Fully Dynamic Secret Sharing Schemes
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
ISC '01 Proceedings of the 4th International Conference on Information Security
Providing Anonymity in Unconditionally Secure Secret Sharing Schemes
Designs, Codes and Cryptography
General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting
Electronic Notes in Theoretical Computer Science (ENTCS)
Ideal Multipartite Secret Sharing Schemes
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Combiner Driven Management Models and Their Applications
Research in Cryptology
MSS: a multi-level data placement scheme for data survival in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Graph decompositions and secret sharing schemes
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
On the optimization of bipartite secret sharing schemes
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
Linear threshold multisecret sharing schemes
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
Crypto topics and applications II
Algorithms and theory of computation handbook
A practical (non-interactive) publicly verifiable secret sharing scheme
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Secret-sharing schemes: a survey
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
Ideal secret sharing schemes for useful multipartite access structures
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
A probabilistic secret sharing scheme for a compartmented access structure
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Multipartite secret sharing by bivariate interpolation
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Ideal hierarchical secret sharing schemes
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
A protocol of member-join in a secret sharing scheme
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Characterizing ideal weighted threshold secret sharing
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
On the optimization of bipartite secret sharing schemes
Designs, Codes and Cryptography
Natural generalizations of threshold secret sharing
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Secured hierarchical secret sharing using ECC based signcryption
Security and Communication Networks
On partial anonymity in secret sharing
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Certificate-Based encryption scheme with general access structure
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Efficient integer span program for hierarchical threshold access structure
Information Processing Letters
Hi-index | 0.00 |