Common Information, Matroid Representation, And Secret Sharing For Matroid Ports | 0 | 0.34 | 2021 |
HLS-Based HW/SW Co-Design of the Post-Quantum Classic McEliece Cryptosystem | 1 | 0.40 | 2021 |
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing | 0 | 0.34 | 2020 |
Secret-Sharing Schemes for General and Uniform Access Structures. | 0 | 0.34 | 2019 |
Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges | 3 | 0.41 | 2019 |
Provably secure public-key encryption with conjunctive and subset keyword search | 1 | 0.36 | 2019 |
Local bounds for the optimal information ratio of secret sharing schemes | 1 | 0.36 | 2019 |
Privacy-Preserving Data Splitting: A Combinatorial Approach | 0 | 0.34 | 2018 |
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing. | 3 | 0.40 | 2018 |
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures | 4 | 0.42 | 2017 |
Private Outsourced Kriging Interpolation. | 0 | 0.34 | 2017 |
Resource-efficient OT combiners with active security. | 1 | 0.35 | 2017 |
On the Information Ratio of Non-perfect Secret Sharing Schemes. | 2 | 0.37 | 2017 |
A Note on Non-Perfect Secret Sharing. | 1 | 0.36 | 2016 |
Bounds on the Information Ratios of Secret Sharing Schemes for Close Access Structures. | 0 | 0.34 | 2016 |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts | 9 | 0.45 | 2016 |
Secret Sharing Schemes for Dense Forbidden Graphs. | 3 | 0.39 | 2016 |
Recent Advances In Non-Perfect Secret Sharing Schemes | 1 | 0.35 | 2016 |
Self-enforcing protocols via co-utile reputation management. | 1 | 0.48 | 2016 |
Extending Brickell–Davenport theorem to non-perfect secret sharing schemes | 4 | 0.42 | 2015 |
Linear spaces and transversal designs: -anonymous combinatorial configurations for anonymous database search notes | 0 | 0.34 | 2014 |
Optimal Non-perfect Uniform Secret Sharing Schemes. | 8 | 0.62 | 2014 |
Erratum to: Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search | 0 | 0.34 | 2014 |
Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes. | 4 | 0.43 | 2013 |
On the optimization of bipartite secret sharing schemes | 14 | 0.64 | 2012 |
Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search | 2 | 0.37 | 2012 |
Secret Sharing Schemes for Very Dense Graphs. | 88 | 2.70 | 2012 |
TTP smartcard-based elgamal cryptosystem using threshold scheme for electronic elections | 0 | 0.34 | 2011 |
Bridging broadcast encryption and group key agreement | 21 | 0.64 | 2011 |
Natural Generalizations of Threshold Secret Sharing | 5 | 0.41 | 2011 |
Ideal secret sharing schemes for useful multipartite access structures | 2 | 0.39 | 2011 |
Ideal Hierarchical Secret Sharing Schemes | 18 | 0.74 | 2010 |