1988
DOI: 10.1137/0401024
|View full text |Cite
|
Sign up to set email alerts
|

A Combinatorial Approach to Threshold Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
44
0

Year Published

1995
1995
2004
2004

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 67 publications
(44 citation statements)
references
References 6 publications
0
44
0
Order By: Relevance
“…Stinson and Vanstone [28] proved that in any (t, k) anonymous threshold scheme, v > (k-t+ 1)ISl +t-1.…”
Section: Anonymous Threshold Schemesmentioning
confidence: 99%
See 3 more Smart Citations
“…Stinson and Vanstone [28] proved that in any (t, k) anonymous threshold scheme, v > (k-t+ 1)ISl +t-1.…”
Section: Anonymous Threshold Schemesmentioning
confidence: 99%
“…We recall the following condition of regularity that in [20] and [28] was made on the distribution of shares of the participants.…”
Section: Anonymous Threshold Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, our scheme improves the share size when t ≤ log n − 2 log log n. These schemes have the additional nice property that they are anonymous, that is, the reconstruction of the secret does not depend on the identity of the authorized set. Anonymous secret-sharing schemes were introduced by [47], and were further studied in [14,33,39].…”
Section: Our Resultsmentioning
confidence: 99%