Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Some improved bounds on the information rate of perfect secret sharing schemes

Published: 01 June 1992 Publication History

Abstract

No abstract available.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Cryptology
Journal of Cryptology  Volume 5, Issue 3
1992
53 pages
ISSN:0933-2790
Issue’s Table of Contents

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 June 1992

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Succinct Computational Secret SharingProceedings of the 55th Annual ACM Symposium on Theory of Computing10.1145/3564246.3585127(1553-1566)Online publication date: 2-Jun-2023
  • (2023)Partial Secret Sharing SchemesIEEE Transactions on Information Theory10.1109/TIT.2023.326509369:8(5364-5385)Online publication date: 1-Aug-2023
  • (2021)Generalized threshold secret sharing and finite geometryDesigns, Codes and Cryptography10.1007/s10623-021-00900-989:9(2067-2078)Online publication date: 1-Sep-2021
  • (2020)Smallest Graphs Achieving the Stinson BoundIEEE Transactions on Information Theory10.1109/TIT.2020.296510266:7(4609-4612)Online publication date: 18-Jun-2020
  • (2019)Secret sharing on large girth graphsCryptography and Communications10.1007/s12095-018-0338-x11:3(399-410)Online publication date: 1-May-2019
  • (2017)The optimal average information ratio of secret-sharing schemes for the access structures based on unicycle graphs and bipartite graphsDiscrete Applied Mathematics10.1016/j.dam.2017.08.006233:C(131-142)Online publication date: 31-Dec-2017
  • (2015)The optimal information rate for graph access structures of nine participantsFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-015-3255-69:5(778-787)Online publication date: 1-Oct-2015
  • (2015)Secret sharing on the d-dimensional cubeDesigns, Codes and Cryptography10.1007/s10623-013-9888-274:3(719-729)Online publication date: 1-Mar-2015
  • (2015)Optimal assignment schemes for general access structures based on linear programmingDesigns, Codes and Cryptography10.1007/s10623-013-9879-374:3(623-644)Online publication date: 1-Mar-2015
  • (2015)Secret Sharing Schemes with General Access StructuresRevised Selected Papers of the 11th International Conference on Information Security and Cryptology - Volume 958910.1007/978-3-319-38898-4_20(341-360)Online publication date: 1-Nov-2015
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media