๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes

โœ Scribed by C. J. Mitchell, F. C. Piper, M. Walker, P. Wild


Book ID
118771437
Publisher
Springer
Year
1996
Tongue
English
Weight
542 KB
Volume
7
Category
Article
ISSN
0925-1022

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Recursive constructions for perfect secr
โœ Hung-Min Sun; Shiuh-Pyng Shieh ๐Ÿ“‚ Article ๐Ÿ“… 1999 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 595 KB

A secret sharing scheme is a method which allows a secret to be shared among a set of participants in such a way that only qualified subsets of participants can recover the secret. A secret sharing scheme is called perfect if unqualified subsets of participants obtain no information regarding the se

The Combinatorics of Perfect Authenticat
โœ Mitchell, Chris; Walker, Michael; Wild, Peter ๐Ÿ“‚ Article ๐Ÿ“… 1994 ๐Ÿ› Society for Industrial and Applied Mathematics ๐ŸŒ English โš– 752 KB