Secret sharing schemes have been studied for over twenty years. An important ap-proach to the construction of secret sharing schemes is based on linear codes. The access structure of the secret sharing scheme based on a linear code is determined by the minimal codewords of the dual code. However, it is very hard in general to deter-mine the minimal codewords of linear codes. Although every linear code gives rise to a secret sharing scheme, the access structure of secret sharing schemes based on only a few classes of codes are determined. The main contributions of this thesis are a new characterization of the minimal codewords of linear codes, the construction of several classes of linear codes that are either optimal or almost optimal, and ...
Secret sharing is an interesting subject of cryptography, and has wide applications in real systems....
Abstract. We introduce a linear code based on resilient maps on vector spaces over finite fields, we...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
In this paper, binary linear codes are used to construct the access structures of a secret sharing s...
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since...
In this paper,, error-correcting codes from perfect nonlinear mappings are constructed, and then emp...
In this paper, we generalize the vector space construction due to Brickell [5]. This generalization,...
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes w...
In this paper, the weight distributions of two classes of linear codes based on all known explicit p...
This paper precisely characterizes secret sharing schemes based on arbitrary linear codes by using t...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some ...
Abstract. We present a novel method for constructing linear secret sharing schemes (LSSS) from linea...
Secret sharing is an interesting subject of cryptography, and has wide applications in real systems....
Abstract. We introduce a linear code based on resilient maps on vector spaces over finite fields, we...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
In this paper, binary linear codes are used to construct the access structures of a secret sharing s...
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since...
In this paper,, error-correcting codes from perfect nonlinear mappings are constructed, and then emp...
In this paper, we generalize the vector space construction due to Brickell [5]. This generalization,...
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes w...
In this paper, the weight distributions of two classes of linear codes based on all known explicit p...
This paper precisely characterizes secret sharing schemes based on arbitrary linear codes by using t...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some ...
Abstract. We present a novel method for constructing linear secret sharing schemes (LSSS) from linea...
Secret sharing is an interesting subject of cryptography, and has wide applications in real systems....
Abstract. We introduce a linear code based on resilient maps on vector spaces over finite fields, we...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...