Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

An explication of secret sharing schemes

Published: 01 December 1992 Publication History

Abstract

No abstract available.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Designs, Codes and Cryptography
Designs, Codes and Cryptography  Volume 2, Issue 4
Dec. 1992
86 pages
ISSN:0925-1022
Issue’s Table of Contents

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 December 1992

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)The Capacity Region of Distributed Multi-User Secret Sharing Under Perfect SecrecyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.348466619(9954-9969)Online publication date: 1-Jan-2024
  • (2023)New Results on Distributed Secret Sharing ProtocolsData and Applications Security and Privacy XXXVII10.1007/978-3-031-37586-6_4(51-68)Online publication date: 19-Jul-2023
  • (2022)Ideal hierarchical secret sharing and lattice path matroidsDesigns, Codes and Cryptography10.1007/s10623-022-01154-991:4(1335-1349)Online publication date: 20-Nov-2022
  • (2021)On the enumeration of Boolean functions with distinguished variablesSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-020-05422-525:19(12627-12640)Online publication date: 1-Oct-2021
  • (2021)Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODVSecurity, Privacy, and Applied Cryptography Engineering10.1007/978-3-030-95085-9_7(129-147)Online publication date: 10-Dec-2021
  • (2020)Reversible Image Secret SharingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2020.300173515(3848-3858)Online publication date: 1-Jan-2020
  • (2020)Penrose tiling for visual secret sharingMultimedia Tools and Applications10.1007/s11042-020-09568-079:43-44(32693-32710)Online publication date: 1-Nov-2020
  • (2019)Private Authentication: Optimal Information Theoretic Schemes2019 IEEE Information Theory Workshop (ITW)10.1109/ITW44776.2019.8989293(1-5)Online publication date: 25-Aug-2019
  • (2019)Security enhancement of shares generation process for multimedia counting-based secret-sharing techniqueMultimedia Tools and Applications10.1007/s11042-018-6977-278:12(16283-16310)Online publication date: 1-Jun-2019
  • (2019)Nearly optimal robust secret sharingDesigns, Codes and Cryptography10.1007/s10623-018-0578-y87:8(1777-1796)Online publication date: 1-Aug-2019
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media