Extensions of access structures and their cryptographic applications
- 21 April 2010
- journal article
- research article
- Published by Springer Nature in Applicable Algebra in Engineering, Communication and Computing
- Vol. 21 (4), 257-284
- https://doi.org/10.1007/s00200-010-0125-1
Abstract
No abstract availableKeywords
This publication has 25 references indexed in Scilit:
- Multipartite Secret Sharing by Bivariate InterpolationJournal of Cryptology, 2008
- Characterizing Ideal Weighted Threshold Secret SharingSIAM Journal on Discrete Mathematics, 2008
- CCA2-Secure Threshold Broadcast Encryption with Shorter CiphertextsPublished by Springer Nature ,2007
- Hierarchical Threshold Secret SharingJournal of Cryptology, 2007
- Efficient ID-based Broadcast Threshold Decryption in Ad Hoc NetworkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Chosen Ciphertext Secure Public Key Threshold Encryption Without Random OraclesLecture Notes in Computer Science, 2006
- Secret sharing schemes with bipartite access structureIEEE Transactions on Information Theory, 2000
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)Lecture Notes in Computer Science, 1999
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- How to share a secretCommunications of the ACM, 1979