Author of the publication

Secret sharing schemes on access structures with intersection number equal to one.

, and . Discret. Appl. Math., 154 (3): 552-563 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secret sharing schemes on sparse homogeneous access structures with rank three., and . IACR Cryptology ePrint Archive, (2003)On Secret Sharing with Nonlinear Product Reconstruction., , , , and . SIAM J. Discret. Math., 29 (2): 1114-1131 (2015)Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model., , and . TCC (1), volume 9014 of Lecture Notes in Computer Science, page 481-501. Springer, (2015)A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra., , and . CRYPTO, volume 4622 of Lecture Notes in Computer Science, page 613-630. Springer, (2007)Secret Sharing, Rank Inequalities and Information Inequalities., , and . CRYPTO (2), volume 8043 of Lecture Notes in Computer Science, page 277-288. Springer, (2013)Common information, matroid representation, and secret sharing for matroid ports., , , and . Des. Codes Cryptogr., 89 (1): 143-166 (2021)Ideal Multipartite Secret Sharing Schemes., , and . EUROCRYPT, volume 4515 of Lecture Notes in Computer Science, page 448-465. Springer, (2007)Representing Small Identically Self-Dual Matroids by Self-Dual Codes., and . SIAM J. Discret. Math., 20 (4): 1046-1055 (2006)Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures., , , and . Theor. Comput. Sci., 320 (2-3): 269-291 (2004)Spanners of Underlying Graphs of Iterated Line Digraphs., and . SIROCCO, page 180-194. Carleton Scientific, (1996)