Coding Theorems for a $(2,2)$-Threshold Scheme With Detectability of Impersonation Attacks
From MaRDI portal
Publication:2989811
DOI10.1109/TIT.2012.2204546zbMath1364.94272arXiv1004.4530OpenAlexW2149760680MaRDI QIDQ2989811
Mitsugu Iwamoto, Hirosuke Yamamoto, Hiroki Koga
Publication date: 8 June 2017
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1004.4530
Authentication, digital signatures and secret sharing (94A62) Coding theorems (Shannon theory) (94A24)
This page was built for publication: Coding Theorems for a $(2,2)$-Threshold Scheme With Detectability of Impersonation Attacks