Operations over Linear Secret Sharing Schemes
From MaRDI portal
Publication:3297683
DOI10.1007/978-3-030-32430-8_30zbMath1457.94221OpenAlexW2981889402MaRDI QIDQ3297683
Publication date: 20 July 2020
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-32430-8_30
simple gameaccess structuresecret sharing schemecomposition of access structuresdual access structure
Cites Work
- Ideal multipartite secret sharing schemes
- Hierarchical threshold secret sharing
- A characterisation of ideal weighted secret sharing schemes
- An explication of secret sharing schemes
- Secure multi-party computation made simple
- Secret-Sharing Schemes: A Survey
- How to share a secret
- Ideal Hierarchical Secret Sharing Schemes
- Characterizing Ideal Weighted Threshold Secret Sharing
- A FORBIDDEN MINOR CHARACTERIZATION OF MATROID PORTS
- ON THE COMPOSITION OF SECRET SHARING SCHEMES RELATED TO CODES
- Applied Cryptography and Network Security
- Unnamed Item
- Unnamed Item
This page was built for publication: Operations over Linear Secret Sharing Schemes