Secret Sharing Over Infinite Domains
- 6 July 2001
- book chapter
- Published by Springer Nature
- p. 299-306
- https://doi.org/10.1007/0-387-34805-0_27
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Generalized Linear Threshold SchemePublished by Springer Nature ,2000
- A Combinatorial Approach to Threshold SchemesSIAM Journal on Discrete Mathematics, 1988
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- Randomized byzantine generalsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1983
- Infinite Structures in Information TheoryPublished by Springer Nature ,1983
- Security Proofs for Information Protection SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1981
- How to share a secretCommunications of the ACM, 1979
- Safeguarding cryptographic keysPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1979