Graph Decompositions and Secret Sharing Schemes
- 1 January 1993
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- The Detection of Cheaters in Thershold SchemesSIAM Journal on Discrete Mathematics, 1991
- Some Improved Bounds on the Information Rate of Perfect Secret Sharing SchemesPublished by Springer Nature ,1991
- Geometric Shared Secret and/or Shared Control SchemesPublished by Springer Nature ,1991
- A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutually Trusted PartyPublished by Springer Nature ,1991
- Generalized Secret Sharing and Monotone FunctionsPublished by Springer Nature ,1990
- Verifiable secret sharing and multiparty protocols with honest majorityPublished by Association for Computing Machinery (ACM) ,1989
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- On secret sharing systemsIEEE Transactions on Information Theory, 1983
- On sharing secrets and Reed-Solomon codesCommunications of the ACM, 1981
- How to share a secretCommunications of the ACM, 1979