The size of a share must be large

From MaRDI portal
Publication:1382142

DOI10.1007/s001459900029zbMath0897.94012OpenAlexW2076645411MaRDI QIDQ1382142

László Csirmaz

Publication date: 19 October 1998

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s001459900029




Related Items (52)

Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)Quadratic secret sharing and conditional disclosure of secretsSecret-sharing schemes for very dense graphsOn the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rateOptimal linear secret sharing schemes for graph access structures on six participantsSecret sharing on large girth graphsThreshold Secret Sharing Requires a Linear Size AlphabetTowards breaking the exponential barrier for general secret sharingImproving the linear programming technique in the search for lower bounds in secret sharingRecent Advances in Non-perfect Secret Sharing SchemesOn an infinite family of graphs with information ratio \(2 - 1/k\)Secret sharing based on quantum Fourier transformBounds and constructions for unconditionally secure distributed key distribution schemes for general access structuresThe optimal average information ratio of secret-sharing schemes for the access structures based on unicycle graphs and bipartite graphsLocal bounds for the optimal information ratio of secret sharing schemesOn the information ratio of non-perfect secret sharing schemesAccess structures determined by uniform polymatroidsBipartite secret sharing and staircasesSharing one secret vs. sharing many secrets.Algebraic Cryptanalysis of CTRU CryptosystemThe complexity of the graph access structures on six participantsFinding lower bounds on the complexity of secret sharing schemes by linear programmingIdeal multipartite secret sharing schemesSecret sharing on regular bipartite access structuresCommon information, matroid representation, and secret sharing for matroid portsOptimal information ratio of secret sharing schemes on Dutch windmill graphsOn the information ratio of graphs without high-degree neighborsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationProbabilistic secret sharingOn group-characterizability of homomorphic secret sharing schemesSecret-Sharing Schemes: A SurveyIdeal Secret Sharing Schemes for Useful Multipartite Access StructuresImproved upper bounds for the information rates of the secret sharing schemes induced by the Vámos matroidExtending Brickell-Davenport theorem to non-perfect secret sharing schemesAn ideal multi-secret sharing scheme based on MSPOptimal assignment schemes for general access structures based on linear programmingSharing multiple secrets: Models, schemes and analysisHow to share a secretOptimal complexity of secret sharing schemes with four minimal qualified subsetsOn secret sharing schemes, matroids and polymatroidsMatroids Can Be Far from Ideal Secret SharingThe exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structuresIdeal secret sharing schemes whose minimal qualified subsets have at most three participantsOn abelian and homomorphic secret sharing schemesSecret Sharing Schemes for Dense Forbidden GraphsHypergraph decomposition and secret sharingOn the optimization of bipartite secret sharing schemesIdeal Hierarchical Secret Sharing SchemesUnnamed ItemAn impossibility result on graph secret sharingSecret sharing schemes for ports of matroids of rank 3Some Open Problems in Information-Theoretic Cryptography




This page was built for publication: The size of a share must be large