Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some participants and a dealer. The dealer chooses a secret. The main principle is to distribute a secret amongst a group of participants. Each of whom is called a share of the secret. The secret can be retrieved by participants. Clearly the participants combine their shares to reach the secret. One of the secret sharing schemes is threshold secret sharing scheme. A threshold secret sharing scheme is a method of distribution of information among participants such that can recover the secret but cannot. The coding theory has been an important role in the constructing of the secret sharing schemes. Since the code of a symmetric design is a lin...
Secret sharing schemes with general monotone access structures have been widely discussed in the lit...
International audienceSecret sharing is one of the most important cryptographic protocols. Secret sh...
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and e...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
Secret sharing schemes have been studied for over twenty years. An important ap-proach to the constr...
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
AbstractSecret-sharing is an important topic of cryptography and has applications in information sec...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes w...
In this paper, binary linear codes are used to construct the access structures of a secret sharing s...
We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error co...
In this thesis, we consider secret sharing schemes and network coding. Both of these fields are vita...
Secret sharing is an interesting subject of cryptography, and has wide applications in real systems....
In a Multistage Secret Sharing (MSSS) scheme, the authorized subsets of participants could reconstru...
Secret sharing schemes with general monotone access structures have been widely discussed in the lit...
International audienceSecret sharing is one of the most important cryptographic protocols. Secret sh...
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and e...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
Secret sharing schemes have been studied for over twenty years. An important ap-proach to the constr...
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
AbstractSecret-sharing is an important topic of cryptography and has applications in information sec...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes w...
In this paper, binary linear codes are used to construct the access structures of a secret sharing s...
We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error co...
In this thesis, we consider secret sharing schemes and network coding. Both of these fields are vita...
Secret sharing is an interesting subject of cryptography, and has wide applications in real systems....
In a Multistage Secret Sharing (MSSS) scheme, the authorized subsets of participants could reconstru...
Secret sharing schemes with general monotone access structures have been widely discussed in the lit...
International audienceSecret sharing is one of the most important cryptographic protocols. Secret sh...
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and e...