P. Beguin and A. Cresti. General short computational secret sharing schemes. In Proceedings of EUROCRYPT’95, volume 921 of LNCS, pages 194–208. Springer-Verlag, 1995.
Google Scholar
A. Beimel. Secure Schemes for Secret Sharing and Key Distribution. PhD thesis, Department of Computer Science, Technion-Israel Institute of Technology, 1996.
Google Scholar
A. Beimel and Y. Ishai. On the power of nonlinear secret sharing. In Proceedings of the 16th Annual IEEE Structure in Complexity Theory, pages 188–202, 2001.
Google Scholar
J. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In Proceedings of CRYPTO’88, volume 403 of LNCS, pages 27–35. Springer-Verlag, 1988.
Google Scholar
J.C. Benaloh. Secret sharing homomorphisms: Keeping shares of a secret secret. In Proceedings of CRYPTO’86, volume 263 of LNCS, pages 251–260, Springer-Verlag. 1986.
Google Scholar
G.R. Blakley. Safeguarding cryptographic keys. In Proceedings of AFIPS 1979 National Computer Conference, pages 313–317. AFIPS, 1979.
Google Scholar
G.R. Blakley and C. Meadows. Security of ramp schemes. In Proceedings of CRYPTO’84, volume 196 of LNCS, pages 242–268. Springer Verlag, 1984.
Google Scholar
C. Blundo and D.R. Stinson. Anonymous secret sharing schemes. In Discrete Applied Mathematics, volume 77:13–28, 1997.
MATH
CrossRef
MathSciNet
Google Scholar
E. F. Brickell and D.M. Davenport. On the classification of ideal secret sharing scheme. In Journal of Cryptology, pages 123–134, 1991.
Google Scholar
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. In 26th IEEE FOCS, pages 383–395. 1985.
Google Scholar
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing, or: How to cope with perpetual leakage. In Proceedings of CRYPTO’95, volume 963 of LNCS, pages 339–352. Springer-Verlag, 1995.
Google Scholar
M. Itoh, A. Saito, and T. Nishizeki. Secret sharing scheme realizing general access structure. In Proc. of IEEE Globecom’87, pages 99–102, 1987.
Google Scholar
E.D. Karnin, J.W. Green, and M. E. Hellman. On secret sharing systems. In IEEE Transactions on Information Theory, IT-29, pages 35–41, 1982.
Google Scholar
M. Kerchmer and A. Wigderson. On span programs. In Proceedings of the 8th IEEE Structure in Complexity Theory, pages 102–111, 1993.
Google Scholar
K. Kurosawa, K. Okada, K. Sakano, W. Ogata, and S. Tsuji. Nonperfect secret sharing schemes and matroids. In Proceedings of EUROCRYPT’93, volume 765 of LNCS, pages 126–141. Springer Verlag, 1993.
Google Scholar
W. Ogata and K. Kurosawa. Some basic properties of general nonperfect secret sharing schemes. Journal of Universal Computer Science, 4(8):690–704, 1998.
MATH
MathSciNet
Google Scholar
R. Ostrovsky and M. Yung. How to withstand mobile virus attacks. In Proceedings of the 10th ACM PODC, pages 51–59,1991.
Google Scholar
A. Renvall and C. Ding. A nonlinear secret sharing scheme. In ACISP’96, volume 1172 of LNCS, pages 56–66, 1996.
Google Scholar
A. Shamir. How to share a secret. Communications of the ACM, 22:612–613, 1979.
MATH
CrossRef
MathSciNet
Google Scholar
M. Tompa and H. Woll. How to share a secret with cheaters. In Proceedings of CRYPTO’86, volume 263 of LNCS, pages 261–265, 1987.
Google Scholar