On ideal non-perfect secret sharing schemes
This paper first extends the result of Blakley and Kabatianski
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 216 |
---|---|
container_issue | |
container_start_page | 207 |
container_title | |
container_volume | 1361 |
creator | Paillier, Pascal |
description | This paper first extends the result of Blakley and Kabatianski |
doi_str_mv | 10.1007/BFb0028171 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_2037964</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2037964</sourcerecordid><originalsourceid>FETCH-LOGICAL-p1321-3011e7de93374b55829ceadca53a258cba66329b6a382649e9e9469bbd46b1313</originalsourceid><addsrcrecordid>eNpFUD1PwzAUNF8SbenCL8jAgIQC7_k5_hihooBUqQvMke280kCbRjYL_56UIqEbbrjT3emEuES4RQBz9zAPANKiwSMxdcZSpUA7ba07FiPUiCWRcidi_CsoUICnYgQEsnRG0bkY5_wBQ4RxciRull3RNuw3Rbfryp7TiuNXkTkmHmjtU9u9Fzmuecv5Qpyt_Cbz9I8n4m3--Dp7LhfLp5fZ_aLskeRQD4hsGnZERoWqstJF9k30FXlZ2Ri81iRd0J6s1MrxAKVdCI3SAQlpIq4Oub3P0W9WyXexzXWf2q1P37UEMk6rwXZ9sOV-v5JTHXa7z1wj1Puj6v-j6AfV0lOQ</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>On ideal non-perfect secret sharing schemes</title><source>Springer Books</source><creator>Paillier, Pascal</creator><contributor>Roe, Michael ; Lomas, Mark ; Christianson, Bruce ; Crispo, Bruno</contributor><creatorcontrib>Paillier, Pascal ; Roe, Michael ; Lomas, Mark ; Christianson, Bruce ; Crispo, Bruno</creatorcontrib><description>This paper first extends the result of Blakley and Kabatianski</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540640401</identifier><identifier>ISBN: 9783540640400</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540696889</identifier><identifier>EISBN: 3540696881</identifier><identifier>DOI: 10.1007/BFb0028171</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Access Structure ; Applied sciences ; Computer science; control theory; systems ; Exact sciences and technology ; Information theory ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Rank Function ; Secret Sharing ; Secret Sharing Scheme ; Software ; Telecommunications and information theory ; Visual Cryptography</subject><ispartof>Lecture notes in computer science, 2005, Vol.1361, p.207-216</ispartof><rights>Springer-Verlag Berlin Heidelberg 1998</rights><rights>1998 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/BFb0028171$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/BFb0028171$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,777,778,782,787,788,791,4038,4039,27908,38238,41425,42494</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=2037964$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Roe, Michael</contributor><contributor>Lomas, Mark</contributor><contributor>Christianson, Bruce</contributor><contributor>Crispo, Bruno</contributor><creatorcontrib>Paillier, Pascal</creatorcontrib><title>On ideal non-perfect secret sharing schemes</title><title>Lecture notes in computer science</title><description>This paper first extends the result of Blakley and Kabatianski</description><subject>Access Structure</subject><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><subject>Information theory</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Rank Function</subject><subject>Secret Sharing</subject><subject>Secret Sharing Scheme</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><subject>Visual Cryptography</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540640401</isbn><isbn>9783540640400</isbn><isbn>9783540696889</isbn><isbn>3540696881</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpFUD1PwzAUNF8SbenCL8jAgIQC7_k5_hihooBUqQvMke280kCbRjYL_56UIqEbbrjT3emEuES4RQBz9zAPANKiwSMxdcZSpUA7ba07FiPUiCWRcidi_CsoUICnYgQEsnRG0bkY5_wBQ4RxciRull3RNuw3Rbfryp7TiuNXkTkmHmjtU9u9Fzmuecv5Qpyt_Cbz9I8n4m3--Dp7LhfLp5fZ_aLskeRQD4hsGnZERoWqstJF9k30FXlZ2Ri81iRd0J6s1MrxAKVdCI3SAQlpIq4Oub3P0W9WyXexzXWf2q1P37UEMk6rwXZ9sOV-v5JTHXa7z1wj1Puj6v-j6AfV0lOQ</recordid><startdate>20050615</startdate><enddate>20050615</enddate><creator>Paillier, Pascal</creator><general>Springer Berlin Heidelberg</general><general>Springer-Verlag</general><scope>IQODW</scope></search><sort><creationdate>20050615</creationdate><title>On ideal non-perfect secret sharing schemes</title><author>Paillier, Pascal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p1321-3011e7de93374b55829ceadca53a258cba66329b6a382649e9e9469bbd46b1313</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Access Structure</topic><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><topic>Information theory</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Rank Function</topic><topic>Secret Sharing</topic><topic>Secret Sharing Scheme</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><topic>Visual Cryptography</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Paillier, Pascal</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Paillier, Pascal</au><au>Roe, Michael</au><au>Lomas, Mark</au><au>Christianson, Bruce</au><au>Crispo, Bruno</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>On ideal non-perfect secret sharing schemes</atitle><btitle>Lecture notes in computer science</btitle><date>2005-06-15</date><risdate>2005</risdate><volume>1361</volume><spage>207</spage><epage>216</epage><pages>207-216</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540640401</isbn><isbn>9783540640400</isbn><eisbn>9783540696889</eisbn><eisbn>3540696881</eisbn><abstract>This paper first extends the result of Blakley and Kabatianski</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/BFb0028171</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture notes in computer science, 2005, Vol.1361, p.207-216 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_2037964 |
source | Springer Books |
subjects | Access Structure Applied sciences Computer science control theory systems Exact sciences and technology Information theory Information, signal and communications theory Memory and file management (including protection and security) Memory organisation. Data processing Rank Function Secret Sharing Secret Sharing Scheme Software Telecommunications and information theory Visual Cryptography |
title | On ideal non-perfect secret sharing schemes |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T09%3A00%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=On%20ideal%20non-perfect%20secret%20sharing%20schemes&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Paillier,%20Pascal&rft.date=2005-06-15&rft.volume=1361&rft.spage=207&rft.epage=216&rft.pages=207-216&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540640401&rft.isbn_list=9783540640400&rft_id=info:doi/10.1007/BFb0028171&rft_dat=%3Cpascalfrancis_sprin%3E2037964%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540696889&rft.eisbn_list=3540696881&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |