How to (Really) Share a Secret
- 1 January 1990
- book chapter
- Published by Springer Nature
- p. 390-448
- https://doi.org/10.1007/0-387-34799-2_30
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Some New Classes of Geometric Threshold SchemesPublished by Springer Nature ,1988
- Enciphered Geometry. Some Applications of Geometry To CryptographyPublished by Elsevier ,1988
- Verifiable secret sharing and achieving simultaneity in the presence of faultsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- A modular approach to key safeguardingIEEE Transactions on Information Theory, 1983
- On secret sharing systemsIEEE Transactions on Information Theory, 1983
- Secret Sharing SystemsPublished by Springer Nature ,1983
- On sharing secrets and Reed-Solomon codesCommunications of the ACM, 1981
- Security Proofs for Information Protection SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1981
- One time Pads are Key Safegaurding Schemes, not Cryptosystems. Fast Key Safeguarding Schemes (Threshold Schemes) ExistPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- Protecting Shared Cryptographic KeysPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980