On ideal non-perfect secret sharing schemes

This paper first extends the result of Blakley and Kabatianski

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Paillier, Pascal
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 216
container_issue
container_start_page 207
container_title
container_volume 1361
creator Paillier, Pascal
description This paper first extends the result of Blakley and Kabatianski
doi_str_mv 10.1007/BFb0028171
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_2037964</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2037964</sourcerecordid><originalsourceid>FETCH-LOGICAL-p1321-3011e7de93374b55829ceadca53a258cba66329b6a382649e9e9469bbd46b1313</originalsourceid><addsrcrecordid>eNpFUD1PwzAUNF8SbenCL8jAgIQC7_k5_hihooBUqQvMke280kCbRjYL_56UIqEbbrjT3emEuES4RQBz9zAPANKiwSMxdcZSpUA7ba07FiPUiCWRcidi_CsoUICnYgQEsnRG0bkY5_wBQ4RxciRull3RNuw3Rbfryp7TiuNXkTkmHmjtU9u9Fzmuecv5Qpyt_Cbz9I8n4m3--Dp7LhfLp5fZ_aLskeRQD4hsGnZERoWqstJF9k30FXlZ2Ri81iRd0J6s1MrxAKVdCI3SAQlpIq4Oub3P0W9WyXexzXWf2q1P37UEMk6rwXZ9sOV-v5JTHXa7z1wj1Puj6v-j6AfV0lOQ</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>On ideal non-perfect secret sharing schemes</title><source>Springer Books</source><creator>Paillier, Pascal</creator><contributor>Roe, Michael ; Lomas, Mark ; Christianson, Bruce ; Crispo, Bruno</contributor><creatorcontrib>Paillier, Pascal ; Roe, Michael ; Lomas, Mark ; Christianson, Bruce ; Crispo, Bruno</creatorcontrib><description>This paper first extends the result of Blakley and Kabatianski</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540640401</identifier><identifier>ISBN: 9783540640400</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540696889</identifier><identifier>EISBN: 3540696881</identifier><identifier>DOI: 10.1007/BFb0028171</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Access Structure ; Applied sciences ; Computer science; control theory; systems ; Exact sciences and technology ; Information theory ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Rank Function ; Secret Sharing ; Secret Sharing Scheme ; Software ; Telecommunications and information theory ; Visual Cryptography</subject><ispartof>Lecture notes in computer science, 2005, Vol.1361, p.207-216</ispartof><rights>Springer-Verlag Berlin Heidelberg 1998</rights><rights>1998 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/BFb0028171$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/BFb0028171$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,777,778,782,787,788,791,4038,4039,27908,38238,41425,42494</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=2037964$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Roe, Michael</contributor><contributor>Lomas, Mark</contributor><contributor>Christianson, Bruce</contributor><contributor>Crispo, Bruno</contributor><creatorcontrib>Paillier, Pascal</creatorcontrib><title>On ideal non-perfect secret sharing schemes</title><title>Lecture notes in computer science</title><description>This paper first extends the result of Blakley and Kabatianski</description><subject>Access Structure</subject><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><subject>Information theory</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Rank Function</subject><subject>Secret Sharing</subject><subject>Secret Sharing Scheme</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><subject>Visual Cryptography</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540640401</isbn><isbn>9783540640400</isbn><isbn>9783540696889</isbn><isbn>3540696881</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpFUD1PwzAUNF8SbenCL8jAgIQC7_k5_hihooBUqQvMke280kCbRjYL_56UIqEbbrjT3emEuES4RQBz9zAPANKiwSMxdcZSpUA7ba07FiPUiCWRcidi_CsoUICnYgQEsnRG0bkY5_wBQ4RxciRull3RNuw3Rbfryp7TiuNXkTkmHmjtU9u9Fzmuecv5Qpyt_Cbz9I8n4m3--Dp7LhfLp5fZ_aLskeRQD4hsGnZERoWqstJF9k30FXlZ2Ri81iRd0J6s1MrxAKVdCI3SAQlpIq4Oub3P0W9WyXexzXWf2q1P37UEMk6rwXZ9sOV-v5JTHXa7z1wj1Puj6v-j6AfV0lOQ</recordid><startdate>20050615</startdate><enddate>20050615</enddate><creator>Paillier, Pascal</creator><general>Springer Berlin Heidelberg</general><general>Springer-Verlag</general><scope>IQODW</scope></search><sort><creationdate>20050615</creationdate><title>On ideal non-perfect secret sharing schemes</title><author>Paillier, Pascal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p1321-3011e7de93374b55829ceadca53a258cba66329b6a382649e9e9469bbd46b1313</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Access Structure</topic><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><topic>Information theory</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Rank Function</topic><topic>Secret Sharing</topic><topic>Secret Sharing Scheme</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><topic>Visual Cryptography</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Paillier, Pascal</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Paillier, Pascal</au><au>Roe, Michael</au><au>Lomas, Mark</au><au>Christianson, Bruce</au><au>Crispo, Bruno</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>On ideal non-perfect secret sharing schemes</atitle><btitle>Lecture notes in computer science</btitle><date>2005-06-15</date><risdate>2005</risdate><volume>1361</volume><spage>207</spage><epage>216</epage><pages>207-216</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540640401</isbn><isbn>9783540640400</isbn><eisbn>9783540696889</eisbn><eisbn>3540696881</eisbn><abstract>This paper first extends the result of Blakley and Kabatianski</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/BFb0028171</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2005, Vol.1361, p.207-216
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_2037964
source Springer Books
subjects Access Structure
Applied sciences
Computer science
control theory
systems
Exact sciences and technology
Information theory
Information, signal and communications theory
Memory and file management (including protection and security)
Memory organisation. Data processing
Rank Function
Secret Sharing
Secret Sharing Scheme
Software
Telecommunications and information theory
Visual Cryptography
title On ideal non-perfect secret sharing schemes
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T09%3A00%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=On%20ideal%20non-perfect%20secret%20sharing%20schemes&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Paillier,%20Pascal&rft.date=2005-06-15&rft.volume=1361&rft.spage=207&rft.epage=216&rft.pages=207-216&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540640401&rft.isbn_list=9783540640400&rft_id=info:doi/10.1007/BFb0028171&rft_dat=%3Cpascalfrancis_sprin%3E2037964%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540696889&rft.eisbn_list=3540696881&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true