279
Views
1
CrossRef citations to date
0
Altmetric
Section A

On constructing 1-cheating immune secret-sharing functions

, &
Pages 30-34 | Received 09 May 2011, Accepted 21 Oct 2011, Published online: 06 Dec 2011

References

  • Blakley , G. R. Safeguarding cryptographic keys . Proceedings of AFIPS 1979 National Computer Conference Vol. 48 . June . pp. 313 – 317 . New York
  • Shamir , A. 1979 . How to share a secret . Commun. ACM , 22 : 612 – 613 .
  • Tompa , M. and Woll , H. 1988 . How to share a secret with cheaters . J. Cryptol , 1 ( 2 ) : 133 – 138 .
  • Webster , A. F. and Tavares , S. E. On the designs of S-boxes . Advances in Cryptology – CRYPTO’85 . pp. 523 – 534 . Berlin : Springer . Lecture Notes in Computer Science Vol. 219
  • Xiao , G. and Massey , J. L. 1988 . A spectral characterization of correlation immune combining function . IEEE Trans. Inform. Theory , 34 ( 5 ) : 569 – 571 .
  • Zhang , X. M. and Pieprzyk , J. Cheating immune secret sharing . ICICS’2001 . pp. 144 – 149 . Lecture Notes in Computer Science Vol. 2229

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.