Generalized linear threshold scheme
Proceedings of CRYPTO 84 on Advances in cryptology
Proceedings of CRYPTO 84 on Advances in cryptology
How to keep a secret alive: extensible partial key, key safeguarding, and threshold systems
Proceedings of CRYPTO 84 on Advances in cryptology
Secret sharing homomorphisms: keeping shares of a secret secret
Proceedings on Advances in cryptology---CRYPTO '86
How to share a secret with cheaters
Proceedings on Advances in cryptology---CRYPTO '86
Smallest possible message expansion in threshold schemes
Proceedings on Advances in cryptology---CRYPTO '86
Some new classes of geometric threshold schemes
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A combinatorial approach to threshold schemes
SIAM Journal on Discrete Mathematics
On sharing secrets and Reed-Solomon codes
Communications of the ACM
Communications of the ACM
A Combinatorial Approach to Threshold Schemes
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Verifiable secret sharing and achieving simultaneity in the presence of faults
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
A practical scheme for non-interactive verifiable secret sharing
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
Proceedings of the 1982 conference on Cryptography
CRYPTO '89 Proceedings on Advances in cryptology
Verifiable secret sharing for monotone access structures
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A Linear Algebraic Approach to Metering Schemes
Designs, Codes and Cryptography
Projective k-arcs and 2-level secret-sharing schemes
Designs, Codes and Cryptography
Hi-index | 0.00 |