|
[1] A. Shamir, “How to share a secret,” Communications of ACM, vol. 22, pp. 612–613, November 1979. [2] G. R. Blakley and C. Meadows, “Security of ramp schemes,” in Proceedings of CRYPTO 84 on Advances in Cryptology, (New York, NY, USA), pp. 242–268, Springer-Verlag New York, Inc., 1985. [3] H. Yamamoto, “Secret sharing system using (k; l; n) threshold scheme,” Electronics and Communications in Japan (Part I: Communications), vol. 69, no. 9, pp. 46–54, 1986. [4] S. Takahashi and K. Iwamura, “Secret sharing scheme suitable for cloud computing,” in 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp. 530–537, March 2013. [5] S. Takahashi, S. Kobayashi, H. Kang, and K. Iwamura, “Secret sharing scheme for cloud computing using ids,” in 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE), pp. 528–529, Oct 2013. [6] Y. Fujii, M. Tada, N. Hosaka, K. Tochikubo, and T. Kato, “A fast (2, n)-threshold scheme and its application,” Proc. CSS2005, vol. 6, 2005. [7] N. Hosaka, K. Tochikubo, Y. Fujii, M. Tada, and T. Kato, “(2; n)- threshold secret sharing systems based on binary matrices,” Proc. SCIS2007, pp. 2D1–4, 2007. [8] J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, “A fast (3; n)- threshold secret sharing scheme using exclusive-or operations,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E91-A, pp. 127–138, Jan. 2008. [9] J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, “A new (k; n)- threshold secret sharing scheme and its extension,” in Proceedings of the 11th International Conference on Information Security, ISC ’08, (Berlin, Heidelberg), pp. 455–470, Springer-Verlag, 2008. [10] J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, “A fast (k, l, n)-threshold ramp secret sharing scheme.,” IEICE Transactions, vol. 92- A, no. 8, pp. 1808–1821, 2009. [11] K. Omote and T. P. Thao, “Sw-sss: Slepian-wolf coding-based secret sharing scheme,” in International Joint Conference: CISIS’15 and ICEUTE’15 (Á. Herrero, B. Baruque, J. Sedano, H. Quintián, and E. Corchado, eds.), (Cham), pp. 347–365, Springer International Publishing, 2015. [12] L. Chen, T. M. Laing, and K. M. Martin, “Efficient, xor-based, ideal (t; n)-threshold schemes,” in Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings (S. Foresti and G. Persiano, eds.), (Cham), pp. 467–483, Springer International Publishing, 2016.
|