|
[1]
|
Shamir, A. (1979) How to Share a Secret. Communications of the ACM, 22, 612-613. [Google Scholar] [CrossRef]
|
|
[2]
|
Blakley, G.R. (1979) Safeguarding Cryptographic Keys. 1979 International Workshop on Man- aging Requirements Knowledge (MARK), New York, 4-7 June 1979, 313-318. [Google Scholar] [CrossRef]
|
|
[3]
|
Goyal, V., Song, Y. and Srinivasan, A. (2021) Traceable Secret Sharing and Applications. In: Malkin, T. and Peikert, C., Eds., Lecture Notes in Computer Science, Springer International Publishing, 718-747. [Google Scholar] [CrossRef]
|
|
[4]
|
Boneh, D., Partap, A. and Rotem, L. (2024) Traceable Secret Sharing: Strong Security and Efficient Constructions. In: Reyzin, L. and Stebila, D., Eds., Lecture Notes in Computer Science, Springer, 221-256. [Google Scholar] [CrossRef]
|
|
[5]
|
Hoffmann, C. (2024) Traceable Secret Sharing Based on the Chinese Remainder Theorem. Cryptology ePrint Archive, Report 2024/811.
|
|
[6]
|
Baghery, K., Ebrahimi, E., Mirzamohammadi, O., et al. (2025) Traceable Verifiable Secret Sharing and Applications. Cryptology ePrint Archive, Paper 2025/1120.
|
|
[7]
|
Boneh, D., Partap, A. and Rotem, L. (2025) Traceable Verifiable Random Functions. In: Tauman Kalai, Y. and Kamara, S.F., Eds., Lecture Notes in Computer Science, Springer, 203-234. [Google Scholar] [CrossRef]
|
|
[8]
|
Bormet, J., Hofmann, J. and Othman, H. (2025) Traceable Threshold Encryption without a Trusted Dealer. In: Hanaoka, G. and Yang, B.Y., Eds., Lecture Notes in Computer Science, Springer, 471-505. [Google Scholar] [CrossRef]
|
|
[9]
|
Farràs, O. and Guiot, M. (2025) Traceable Secret Sharing Schemes for General Access Struc- tures. Cryptology ePrint Archive, Paper 2025/1120.
|
|
[10]
|
Dziembowski, S., Faust, S., Lizurej, T. and Mielniczuk, M. (2024) Secret Sharing with Snitch- ing. Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, New York, 14-18 October 2024, 840-853. [Google Scholar] [CrossRef]
|
|
[11]
|
Morillo, P., Padró, C., Sáez, G. and Villar, J.L. (1999) Weighted Threshold Secret Sharing Schemes. Information Processing Letters, 70, 211-216. [Google Scholar] [CrossRef]
|