Secret-sharing schemes: A survey
A Beimel - International conference on coding and cryptology, 2011 - Springer
A secret-sharing scheme is a method by which a dealer distributes shares to parties such
that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes …
that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes …
[LIBRO][B] Information theory and network coding
RW Yeung - 2008 - books.google.com
This book is an evolution from my book A First Course in Information Theory published in
2002 when network coding was still at its infancy. The last few years have witnessed the …
2002 when network coding was still at its infancy. The last few years have witnessed the …
[LIBRO][B] A first course in information theory
RW Yeung - 2012 - books.google.com
A First Course in Information Theory is an up-to-date introduction to information theory. In
addition to the classical topics discussed, it provides the first comprehensive treatment of the …
addition to the classical topics discussed, it provides the first comprehensive treatment of the …
The size of a share must be large
L Csirmaz - Journal of cryptology, 1997 - Springer
A secret sharing scheme permits a secret to be shared among participants of an n-element
group in such a way that only qualified subsets of participants can recover the secret. If any …
group in such a way that only qualified subsets of participants can recover the secret. If any …
Intelligent data management and security in cloud computing
This paper will present the authors' own techniques of secret data management and
protection, with particular attention paid to techniques securing data services. Among the …
protection, with particular attention paid to techniques securing data services. Among the …
Compiling for EDGE architectures
A Smith, J Burrill, J Gibson, B Maher… - … Symposium on Code …, 2006 - ieeexplore.ieee.org
Explicit data graph execution (EDGE) architectures offer the possibility of high instruction-
level parallelism with energy efficiency. In EDGE architectures, the compiler breaks a …
level parallelism with energy efficiency. In EDGE architectures, the compiler breaks a …
Perfect secret sharing schemes on five participants
WA Jackson, KM Martin - Designs, codes and cryptography, 1996 - Springer
A perfect secret sharing scheme is a system for the protection of a secret among a number of
participants in such a way that only certain subsets of these participants can reconstruct the …
participants in such a way that only certain subsets of these participants can reconstruct the …
Tight bounds on the information rate of secret sharing schemes
A secret sharing scheme is a protocol by means of which a dealer distributes a secret s
among a set of participants P in such a way that only qualified subsets of P can reconstruct …
among a set of participants P in such a way that only qualified subsets of P can reconstruct …
On the cryptographic complexity of the worst functions
We study the complexity of realizing the “worst” functions in several standard models of
information-theoretic cryptography. In particular, for the case of security against passive …
information-theoretic cryptography. In particular, for the case of security against passive …
Succinct computational secret sharing
A secret-sharing scheme enables a dealer to share a secret s among n parties such that
only authorized subsets of parties, specified by a monotone access structure f:{0, 1} n→{0 …
only authorized subsets of parties, specified by a monotone access structure f:{0, 1} n→{0 …