On the classification of ideal secret sharing schemes (extended abstract)
CRYPTO '89 Proceedings on Advances in cryptology
Secret sharing over infinite domains (extended abstract)
CRYPTO '89 Proceedings on Advances in cryptology
How convincing is your protocol?
ACM SIGACT News
Nonperfect secret sharing schemes and matroids
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Tight Bounds on the Information Rate of Secret SharingSchemes
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Access Control and Signatures via Quorum Secret Sharing
IEEE Transactions on Parallel and Distributed Systems
Secret sharing and visual cryptography schemes
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Sharing One Secret vs. Sharing Many Secrets: Tight Bounds for the Max Improvement Ratio
MFCS '01 Proceedings of the 26th International Symposium on Mathematical Foundations of Computer Science
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
On the Size of Shares for Secret Sharing Schemes
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract)
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
On the Information Rate of Secret Sharing Schemes (Extended Abstract)
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
New General Lower Bounds on the Information Rate of Secret Sharing Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Universally Ideal Secret Sharing Schemes (Preliminary Version)
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
An l-Span Generalized Secret Sharing Scheme
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Secret Sharing with Public Reconstruction (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Non-perfect Secret Sharing over General Access Structures
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Commital Deniable Proofs and Electronic Campaign Finance
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Introduction to Secure Computation
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Distributing Trust on the Internet
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
ISC '01 Proceedings of the 4th International Conference on Information Security
A Generalized Secret Image Sharing and Recovery Scheme
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Cheating Prevention in Linear Secret Sharing
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Secret Sharing in Graph-Based Prohibited Structures
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Randomness in secret sharing and visual cryptography schemes
Theoretical Computer Science
Shared generation of pseudo-random functions
Journal of Complexity - Special issue on coding and cryptography
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Sharing Multiple Secrets: Models, Schemes and Analysis
Designs, Codes and Cryptography
Monotone circuits for monotone weighted threshold functions
Information Processing Letters
Generalised Cumulative Arrays in Secret Sharing
Designs, Codes and Cryptography
Secret sharing schemes with partial broadcast channels
Designs, Codes and Cryptography
Secret image sharing with smaller shadow images
Pattern Recognition Letters
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
New results on non-perfect sharing of multiple secrets
Journal of Systems and Software
Generalized Mignotte's Sequences Over Polynomial Rings
Electronic Notes in Theoretical Computer Science (ENTCS)
General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting
Electronic Notes in Theoretical Computer Science (ENTCS)
Robust computational secret sharing and a unified account of classical secret-sharing goals
Proceedings of the 14th ACM conference on Computer and communications security
Attribute-based encryption with non-monotonic access structures
Proceedings of the 14th ACM conference on Computer and communications security
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
A content-driven access control system
Proceedings of the 7th symposium on Identity and trust on the Internet
Using average case intractability in cryptography
AIC'04 Proceedings of the 4th WSEAS International Conference on Applied Informatics and Communications
Ideal Multipartite Secret Sharing Schemes
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
A New Protocol for Conditional Disclosure of Secrets and Its Applications
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
On Linear Secret Sharing for Connectivity in Directed Graphs
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Hypergraph decomposition and secret sharing
Discrete Applied Mathematics
Efficient Secret Sharing Schemes Based on Unauthorized Subsets
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Ideal secret sharing schemes whose minimal qualified subsets have at most three participants
Designs, Codes and Cryptography
Secret Sharing and Non-Shannon Information Inequalities
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Preserving Privacy versus Data Retention
TAMC '09 Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation
Monotone circuits for monotone weighted threshold functions
Information Processing Letters
Rapid demonstration of linear relations connected by boolean operators
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Efficient and generalized group signatures
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Graph decompositions and secret sharing schemes
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Efficient secret sharing without a mutually trusted authority
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
General short computational secret sharing schemes
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
General secure multi-party computation from any linear secret-sharing scheme
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Weakly-private secret sharing schemes
TCC'07 Proceedings of the 4th conference on Theory of cryptography
A secret sharing scheme using matrices
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartIII
Authenticated data structures for graph and geometric searching
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Multi-layer audit of access rights
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Matroids can be far from ideal secret sharing
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Crypto topics and applications II
Algorithms and theory of computation handbook
Journal of Combinatorial Optimization
Attribute-based authentication for multi-agent systems with dynamic groups
Computer Communications
An ideal multi-secret sharing scheme based on MSP
Information Sciences: an International Journal
SIAM Journal on Discrete Mathematics
Generic constructions for chosen-ciphertext secure attribute based encryption
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Secret-sharing schemes: a survey
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
Ideal secret sharing schemes for useful multipartite access structures
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
Optimal complexity of secret sharing schemes with four minimal qualified subsets
Designs, Codes and Cryptography
Restricted adaptive oblivious transfer
Theoretical Computer Science
Secure cryptographic workflow in the standard model
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
A secure and efficient secret sharing scheme with general access structures
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Intrusion tolerant CA scheme with cheaters detection ability
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Ideal hierarchical secret sharing schemes
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
Finding lower bounds on the complexity of secret sharing schemes by linear programming
LATIN'10 Proceedings of the 9th Latin American conference on Theoretical Informatics
Methods of encrypting monotonic access structures
Annales UMCS, Informatica - Cryptography and data protection
Share conversion, pseudorandom secret-sharing and applications to secure computation
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Characterizing ideal weighted threshold secret sharing
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Visual cryptographic protocols using the trusted initializer
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Key derivation algorithms for monotone access structures in cryptographic file systems
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Linear integer secret sharing and distributed exponentiation
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Proactive verifiable linear integer secret sharing scheme
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
On matroids and non-ideal secret sharing
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Natural generalizations of threshold secret sharing
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
A (2, 2) secret sharing scheme based on hamming code and AMBTC
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part II
Research note: An on-line secret sharing scheme for multi-secrets
Computer Communications
Research note: General secret sharing scheme
Computer Communications
Verifiable quantum (k, n)-threshold secret sharing
Quantum Information Processing
Efficient fully secure attribute-based encryption schemes for general access structures
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Certificate-Based encryption scheme with general access structure
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Secret Sharing Scheme: Vector Space Secret Sharing and F Function
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Vector space secret sharing and an efficient algorithm to construct a φ function
Proceedings of the 51st ACM Southeast Conference
Quantum secret sharing for general access structures based on multiparticle entanglements
Quantum Information Processing
Hi-index | 0.01 |