# Secret sharing

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

Highly Cited

2007

Highly Cited

2007

- 48th Annual IEEE Symposium on Foundations of…
- 2007

We introduce a new primitive called intrusion-resilient secret sharing (IRSS), whose security proof exploits the fact that there… (More)

Is this relevant?

Highly Cited

2004

Highly Cited

2004

- Pattern Recognition Letters
- 2004

Visual secret sharing (VSS) scheme is a perfect secure method that protects a secret image by breaking it into shadow images… (More)

Is this relevant?

Highly Cited

1999

Highly Cited

1999

- 1999

Mark Hillery, Vladimı́r Bužek, and AndréBerthiaume Department of Physics and Astronomy, Hunter College, City University of New… (More)

Is this relevant?

Highly Cited

1999

Highly Cited

1999

- 1999

The use of a linear code to "split" secrets into equal-size shares is considered. The determination of which sets of shares can… (More)

Is this relevant?

Highly Cited

1995

Highly Cited

1995

- CRYPTO
- 1995

Secret sharing schemes protect secrets by distributing them over diierent locations (share holders). In particular, in k out of n… (More)

Is this relevant?

Highly Cited

1994

Highly Cited

1994

- IEEE Trans. Information Theory
- 1994

The purpose of this paper is to decribe a very powerful decomposition construction for perfect secret sharing schemes. We give… (More)

Is this relevant?

Highly Cited

1993

Highly Cited

1993

- CRYPTO
- 1993

A well-known fact in the theory of secret sharing schemes is that shares must be of length at least as the secret itself. However… (More)

Is this relevant?

Highly Cited

1992

Highly Cited

1992

- Des. Codes Cryptography
- 1992

This paper is an explication of secret sharing schemes, emphasizing combinatorial construction methods. The main problem we… (More)

Is this relevant?

Highly Cited

1988

Highly Cited

1988

- CRYPTO
- 1988

Secret Sharing from the perspective of threshold schemes has been wellstudied over the past decade. Threshold schemes, however… (More)

Is this relevant?

Highly Cited

1983

Highly Cited

1983

- IEEE Trans. Information Theory
- 1983

A “secret sharing system” permits a secret to be shared among n trustees in such a way that any k of them can recover the secret… (More)

Is this relevant?