2004
DOI: 10.1016/s0012-365x(03)00283-8
|View full text |Cite
|
Sign up to set email alerts
|

New combinatorial designs and their applications to authentication codes and secret sharing schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
114
0

Year Published

2004
2004
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 79 publications
(114 citation statements)
references
References 12 publications
0
114
0
Order By: Relevance
“…In a difference family of sets, each nonidentity element of a group will arise some fixed number of times as a difference between same-set elements. External difference families (EDFs) were introduced in [14] as a method of constructing optimal robust secret sharing schemes. In an EDF, as the name suggests, each nonidentity element arises a fixed number of times as a difference between elements in distinct sets.…”
Section: Introductionmentioning
confidence: 99%
“…In a difference family of sets, each nonidentity element of a group will arise some fixed number of times as a difference between same-set elements. External difference families (EDFs) were introduced in [14] as a method of constructing optimal robust secret sharing schemes. In an EDF, as the name suggests, each nonidentity element arises a fixed number of times as a difference between elements in distinct sets.…”
Section: Introductionmentioning
confidence: 99%
“…Although AMD codes were never formally defined in previous work, some constructions of AMD codes have appeared, mostly in connection with making secret sharing robust [20,7,21]. Although some of these constructions are essentially optimal, all of them are largely inflexible in that the error probability δ is dictated by the cardinality of the source space S: δ ≈ 1/|S|.…”
Section: Linear Secret Sharing Schemesmentioning
confidence: 99%
“…Our combinatorial approach must be discussed with respect to earlier work by Ogata and Kurosawa [20] and Ogata, Kurosawa, Stinson and Saido [21]. In [20] the idea of using the classical notion of planar difference sets is introduced, and applications to (in our terminology) weakly secure AMD codes are given.…”
Section: C3 Relation To Earlier Workmentioning
confidence: 99%
See 2 more Smart Citations