Bibliography on Secret Sharing Schemes
maintained by Douglas Stinson and Ruizhong Wei
version 4.1
October 13, 1998
In the late 1980's,
Gus Simmons compiled a bibliography of papers on secret sharing schemes.
As far as we know, the most recent version of his bibliography
was published in his book Contemporary Cryptology in 1992.
At that time he had a list of 68 papers.
We are not aware if Gus has continued to maintain his bibliography,
but we felt it would be useful to create an uptodate bibliography
and make it available on the WWW ...
so that is what we are doing here.
The current version of this bibliography has 216 entries.
In general, we are including papers that are published in
conference proceedings and journals (but not unpublished technical
reports, preprints or dissertations). We would appreciate knowing of any
errors in this
list, as well as any papers that should be added, updates to
unpublished papers, etc. Please email us.
See also the bibliography on
authentication codes .

R. Ahlswede and I. Csiszar,
Common randomness in information theory and cryptography I: secret
sharing,
IEEE Transactions on Information Theory 39
(1993), 11211132.

N. Alon, Z. Galil and M. Yung,
Efficient dynamicresharing "verifiable secret sharing" against
mobile adversary,
in "European Symposium on Algorithms 95",
Lecture Notes in Computer Science979, 523537.

C. A. Asmuth and G. R. Blakley,
Pooling, Splitting and reconstituting information to overcome
total failure of some channels of communication,
in "Proceedings of the 1982 Symposium on
Security and Privacy",
IEEE Press, 1982, 156169.

C. A. Asmuth and J. Bloom,
A modular approach to key safeguarding,
IEEE Transactions on Information Theory 29
(1983), 208210.

G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson,
Visual cryptography for general access structures,
Information and Computation
129 (1996), 86106.

G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson,
Constructions and bounds for visual
cryptography, in
"23rd International Colloquium on Automata, Languages and
Programming", F. M. auf der Heide and B. Monien, eds.,
Lecture Notes in Computer Science 1099
(1996), 416428.

S. Barwick, Y. Desmedt and P. Wild,
Homomorphic threshold schemes, karcs and
Lenstra's constant,
in "Cryptography and Coding IV",
Oxford University Press, 1995,
95102.

P. Beguin and A. Cresti,
General short computational secret sharing schemes,
in "Advances in Cryptology  EUROCRYPT '95",
L. C. Guillou and J.J. Quisquater, eds.,
Lecture Notes in Computer Science 921
(1995), 194208.

A. Beimel and B. Chor,
Universally ideal secret
sharing schemes,
IEEE Transactions on Information Theory 40 (1994),
786794.
[Preliminary version appeared in "Advances in Cryptology  CRYPTO '92",
E. F. Brickell, ed.,
Lecture Notes in Computer Science 740 (1993), 183195.]

A. Beimel and B. Chor,
Secret sharing with public reconstruction,
in "Advances in Cryptology  CRYPTO '95",
D. Coppersmith, ed.,
Lecture Notes in Computer Science 963
(1995), 353366.

J. Cohen Benaloh,
Secret sharing homomorphisms: keeping shares of a secret secret,
in "Advances in Cryptology  CRYPTO '86",
A. M. Odlyzko, ed.,
Lecture Notes in Computer Science 263
(1987), 251260.

J. Benaloh and J. Leichter,
Generalized secret sharing and monotone functions,
in "Advances in Cryptology  CRYPTO '88",
S. Goldwasser, ed.,
Lecture Notes in Computer Science 403
(1989), 2735.

M. BenOr, S. Goldwasser and A. Wigderson,
Completeness theorems for noncryptographic faulttolerant
distributed computation,
in "20th Annual Symposium on
Theory of Computing", ACM Press, 1988, 110.

M. Bertilsson and I. Ingemarsson,
A construction of practical secret sharing schemes
using linear block codes,
in "Advances in Cryptology  AUSCRYPT '92",
J. Seberry and Y. Zheng, eds.,
Lecture Notes in Computer Science 718
(1993), 6779.

T. Beth, H. J. Knobloch and M. Otten,
Verifiable secret sharing for monotone access structures,
in "1st ACM Conference on Computer and Communications Security",
ACM Press, 1993,
189194.

A. Beutelspacher,
Enciphered geometry: some applications of geometry to cryptography,
in "Combinatorics '86",
A. Barlotti, M. Marchi and G. Tallini, eds.,
Discrete Applied Mathematics 37
(1988), 5968.

A. Beutelspacher,
How to say "no",
in "Advances in Cryptology  EUROCRYPT '89",
J.J. Quisquater and J. Vandewalle, eds.,
Lecture Notes in Computer Science 434
(1990), 491496.

A. Beutelspacher,
Applications of finite geometry to cryptography,
in "Geometries, Codes and Cryptography",
G. Longo, M. Marchi and A. Sgarro, eds.,
CISM Courses and Lectures No. 313,
SpringerVerlag, 1990, 161186.

A. Beutelspacher and K. Vedder,
Geometric structures as threshold schemes,
in "Cryptography and Coding",
H. J. Beker and F. C. Piper, eds.,
Oxford University Press, 1989, 255268.

A. Beutelspacher and F. Wettl,
On 2level secret sharing,
Designs, Codes and Cryptography 3
(1993), 127134.

I. Biehl and S. Wetzel,
Traceable visual cryptography,
in" Information and Communications Security,
Lecture Notes in Computer Science
1334 (1997), 6171.
 S. R. Blackburn, M. Burmester, Y. Desmedt and P. R. Wild,
Efficient multiplicative sharing schemes,
in "Advances in Cryptology  EUROCRYPT '96",
U. Maurer, ed.,
Lecture Notes in Computer Science 1070
(1996), 107118.

B. Blakley, G. R. Blakley, A. H. Chan and J. Massey,
Threshold schemes with disenrollment,
in "Advances in Cryptology  CRYPTO '92",
E. F. Brickell, ed.,
Lecture Notes in Computer Science 740
(1993), 540548.

G. R. Blakley,
Safeguarding cryptographic keys,
in "Proceedings of the National Computer Conference, 1979",
American Federation of Information Processing Societies Proceedings
48
(1979), 313317.

G. R. Blakley,
Onetime pads are key safeguarding schemes, not cryptosystems:
fast key safeguarding schemes (threshold schemes) exist,
in "Proceedings of the 1980 Symposium on
Security and Privacy",
IEEE Press, 1980, 108113.

G. R. Blakley and R. D. Dixon,
Smallest possible message expansion in threshold schemes,
in "Advances in Cryptology  CRYPTO '86",
A. M. Odlyzko, ed.,
Lecture Notes in Computer Science 263
(1987), 266274.

G. R. Blakley and G. A. Kabatianski,
Linear algebra approach to secret sharing schemes,
in "Error Control, Cryptology, and Speech Compression",
Lecture Notes in Computer Science 829
(1994), 3340.

G. R. Blakley and G. A. Kabatianski,
On general perfect secret sharing schemes,
in "Advances in Cryptology  CRYPTO '95",
D. Coppersmith, ed.,
Lecture Notes in Computer Science 963
(1995), 367371.

G. R. Blakley and C. Meadows,
Security of ramp schemes,
in "Advances in Cryptology  CRYPTO '84",
G. R. Blakley and D. Chaum, eds.,
Lecture Notes in Computer Science 196
(1985), 242268.

G. R. Blakley and L. Swanson,
Security proofs for information protection systems,
in "Proceedings of the 1981 Symposium on
Security and Privacy",
IEEE Press, 1981, 7582.

G. R. Blakley and L. Swanson,
Infinite structures in information theory,
in "Advances in Cryptology  CRYPTO '82",
D. Chaum, R. L. Rivest and A. T. Sherman, eds.,
Plenum Press, 1983, 3950.

R. G. Bleuikli and G. A. Kabatyanskiuli,
Generalized ideal secret sharing schemes and matroids,
Problems Infrom. Transmission, 33(1997),
277284.

C. Blundo,
A note on dynamic threshold schemes,
Information Processing Letters 55 (1995),
189193.

C. Blundo, A. Cresti, A. De Santis and U. Vaccaro,
Fully dynamic secret sharing schemes,
Theoretical Computer Science 155
(1996), 407410.
[Preliminary version appeared
in "Advances in Cryptology  CRYPTO '93",
D. R. Stinson, ed.,
Lecture Notes in Computer Science 773
(1994), 110125.]

C. Blundo and A. De Santis,
On the construction of secret sharing schemes,
in "Structure: From Physics to General Systems,
Festschrift in honour of E. Caianiello",
M. Marinaro and G. Scarpetta, eds., World Scientific, 1992,
245261.

C. Blundo and A. De Santis,
Lower bounds for robust secret sharing schemes,
Inform. Process. Lett., 63(1997), 317321.

C. Blundo, A. De Santis, R. De Simone and U. Vaccaro,
Tight bounds on the information rate of secret sharing schemes,
Designs, Codes and Cryptography 11 (1997), 107122.

C. Blundo, A. De Santis, G. Di Crescenzo, A. Giorgio Gaggia and U. Vaccaro,
Multisecret sharing schemes,
in "Advances in Cryptology  CRYPTO '94",
Y. G. Desmedt, ed.,
Lecture Notes in Computer Science 839
(1994), 150163.
C. Blundo, A. De Santis, R. De Simone and U. Vaccaro,
New bounds on the share's size in secret sharing schemes,
in "PRAGOCRYPT'96", CTU Publishing House, (1996), 349358.

C. Blundo, A. De Santis, L. Gargano and U. Vaccaro,
On the information rate of secret sharing schemes,
Theoretical Computer Science 154
(1996), 283306.
[Preliminary version appeared
in ``Advances in Cryptology  CRYPTO '92'',
E. F. Brickell, ed.,
Lecture Notes in Computer Science 740
(1993), 148167.]

C. Blundo, A. De Santis, L. Gargano and U. Vaccaro,
Secret sharing with veto capabilities,
in "Algebraic Coding, First FrenchIsraeli Workshop",
G. Cohen, S. Litsyn, A. Lobstein and G. Zemor, eds.,
Lecture Notes in Computer Science 781 (1993), 8289.

C. Blundo, A. De Santis, A. Giorgio Gaggia, and U. Vaccaro,
Lower Bounds in Secret Sharing Schemes,
in " ISIT '94 ", (1994),491

C. Blundo, A. De Santis, A. Giorgio Gaggia and U. Vaccaro,
New bounds on the information rate of secret sharing schemes,
IEEE Transactions on Information Theory 41
(1995), 549554.

C. Blundo, A. De Santis and U. Vaccaro,
On secret sharing schemes,
Information Processing Letters, to appear.

C. Blundo, A. De Santis and D. R. Stinson,
On the contrast in visual cryptography schemes,
Journal of Cryptology , to appear.

C. Blundo, A. De Santis, D. R. Stinson and U. Vaccaro,
Graph decompositions and secret sharing schemes,
J. Cryptology 8 (1995), 3964.
[Preliminary version appeared in
"Advances in Cryptology  EUROCRYPT '92",
R. A. Rueppel, ed.,
Lecture Notes in Computer Science 658
(1993), 124.]

C. Blundo, A. De Santis and U. Vaccaro,
Efficient sharing of many secrets,
in "10th Annual Symposium on Theoretical Aspects of
Computer Science",
P. Enjalbert, A. Finnkel and K. Wagner, eds.,
Lecture Notes in Computer Science 665
(1993), 692703.

C. Blundo, A. De Santis and U. Vaccaro,
Randomness in distribution protocols,
Information and Computation 131
(1996), 111139.
[Preliminary version appeared in "Automata,
Languages and Programming, 21st International Colloquium",
S. Abiteboul and E. Shamir, eds.,
Lecture Notes in Computer Science 820
(1994), 568579.]

C. Blundo, A. De Santis and U. Vaccaro,
On secret sharing schemes,
Inform. Process. Lett.
65 (1998), 2532.

C. Blundo, A. Giorgia Gaggia and D. R. Stinson,
On the dealer's randomness required in secret sharing schemes,
Designs, Codes and Cryptography 11 (1997), 107122.
[Preliminary version appeared
in "Advances in Cryptology  EUROCRYPT '94",
A. De Santis, ed.,
Lecture Notes in Computer Science 950 (1995), 3546.]

C. Blundo and D. R. Stinson,
Anonymous secret sharing schemes,
Discrete Applied Mathematics, 77
(1997), 1328.

E. F. Brickell,
Some ideal secret sharing schemes,
Journal of Combinatorial Mathematics and Combinatorial
Computing 6 (1989), 105113.
[Preliminary version appeared in
"Advances in Cryptology  EUROCRYPT '89",
J.J. Quisquater and J. Vandewalle, eds.,
Lecture Notes in Computer Science 434
(1990), 468475.]

E. F. Brickell and D. M. Davenport,
On the classification of ideal secret sharing schemes,
J. Cryptology 4 (1991), 123134.
[Preliminary version appeared in
"Advances in Cryptology  CRYPTO '89",
G. Brassard, ed.,
Lecture Notes in Computer Science 435
(1990), 278285.]

E. F. Brickell and D. R. Stinson,
The detection of cheaters in threshold schemes,
SIAM Journal of Discrete Mathematics 4 (1991), 502510.
[Preliminary version appeared in
"Advances in Cryptology  CRYPTO '88",
S. Goldwasser, ed.,
Lecture Notes in Computer Science 403
(1989), 564577.]

E. F. Brickell and D. R. Stinson,
Some improved bounds on the information rate of perfect secret
sharing schemes,
J. Cryptology 5 (1992), 153166.
[Preliminary version appeared
in "Advances in Cryptology  CRYPTO '90",
A. J. Menezes and S. A. Vanstone, eds.,
Lecture Notes in Computer Science 537
(1991), 242252.]

M. Burmester,
Homomorphisms of sharing schemes: a tool for verifiable signature
sharing, in "Advances in Cryptology  EUROCRYPT '96",
U. Maurer, ed.,
Lecture Notes in Computer Science 1070
(1996), 96106.

C. Cachin,
Online secret sharing,
in "Cryptography and Coding V",
C. Boyd, ed.,
Lecture Notes in Computer Science 1025
(1996), 190198.

Z. Cao,
Finite set theory and its application to cryptology,
Journal of Statistical Planning and Inference
51 (1996), 129136.

R. M. Capocelli, A. De Santis, L. Gargano and U. Vaccaro,
On the size of shares in secret sharing schemes,
J. Cryptology 6 (1993), 157167.
[Preliminary version appeared
in "Advances in Cryptology  CRYPTO '91",
J. Feigenbaum, ed.,
Lecture Notes in Computer Science 576
(1992), 101113.]

R. M. Capocelli, A. De Santis, L. Gargano and U. Vaccaro,
A note on secret sharing schemes,
in "Sequences II: Methods in Communication, Security and Computer
Science",
R. Capocelli and A. De Santis, eds., Springer Verlag,
1993, 335344.

M. Carpentieri,
A perfect threshold secret sharing scheme to identify cheaters,
Designs, Codes and Cryptography 5 (1995), 183188.

M. Carpentieri,
Some democratic secret sharing schemes,
Discrete Applied Mathematics 59 (1995), 293298.

M. Carpentieri, A. De Santis and U. Vaccaro,
Size of shares and probability of cheating in threshold schemes,
in "Advances in Cryptology  EUROCRYPT '93",
T. Helleseth, ed.,
Lecture Notes in Computer Science 765
(1994), 118125.

C. Charnes, K. M. Martin, J. Pieprzyk and R. SafaviNaini,
Sharing secret information in Hierarchical groups,
in "Information and Communications Security",
Lecture Notes in Computer Science,
1334(1997) 8186.

C. Charnes and J. Pieprzyk,
Cumulative arrays and generalised Shamir
secret sharing schemes,
in "17th Australasian Computer Science Conference",
Australian Computer Science Communications 16
(1994), 519528.

C. Charnes and J. Pieprzyk,
Generalised cumulative arrays and their application to
secret sharing schemes,
in "18th Australasian Computer Science Conference",
Australian Computer Science Communications 17
(1995), 6165.

C. Charnes, J. Pieprzyk and R. SafaviNaini,
Conditionally secure secret sharing scheme with
disenrollment capability,
in "2nd ACM Conference on Computer and Communications Security",
ACM Press, 1994,
8995.

G. R. Chaudry and J. Seberry,
Secret sharing schemes based on Room squares,
in "Combinatorics, Complexity and Logic",
SpringerVerlag, 1997,
158167.

D. Chaum,
How to keep a secret alive,
extensible partial key, key safeguarding, and threshold systems,
in "Advances in Cryptology  CRYPTO '84",
G. R. Blakley and D. Chaum, eds.,
Lecture Notes in Computer Science 196
(1985), 481485.

D. Chaum, C. Crepeau and I. Damgard,
Multiparty unconditionally secure protocols,
in: " Proc. 20th Annual Symp. on Theory of Computing",
ACM, (1988), 1119.

D. Chen and D. R. Stinson,
Recent results on combinatorial constructions for threshold schemes,
Australasian Journal of Combinatorics 1 (1990), 2948.

L. Chen, D. Gollmann, C. J. Mitchell and P. Wild,
Secret sharing with reusable polynomials,
in "Information Security and Privacy  ACISP '97",
V. Varadharajan, J. Pieprzyk and Y. Mu, eds.,
Lecture Notes in Computer Science 1270
(1997), 183193.

B. Chor, S. Goldwasser, S. Micali and B. Awerbuch,
Verifiable secret sharing and achieving simultaneity in the
presence of faults,
in "Proceedings of the 26th IEEE Symposium on the
Foundations of Computer Science", IEEE Press, 1985, 383395.

B. Chor and E. Kushilevitz,
Secret sharing over infinite domains,
J. Cryptology 6 (1993), 8795.
[Prelimionary version appeared in
"Advances in Cryptology  CRYPTO '89",
G. Brassard, ed.,
Lecture Notes in Computer Science 435
(1990), 299306.]

J. Cooper, D. Donovan and J. Seberry,
Secret sharing schemes arising from latin squares,
Bulletin of the Institute of Combinatorics and its
Applications 12 (1994),
3343.

R. Cramer, I. Damgard and B. Schoenmakers,
Proofs of partial knowledge and simplified design
of witness hiding protocols,
in "Advances in Cryptology  CRYPTO '94",
Y. G. Desmedt, ed.,
Lecture Notes in Computer Science 839
(1994), 174187.

R. A. Croft and S. P. Harris,
Publickey cryptography and reusable shared secrets,
in "Cryptography and Coding",
H. J. Beker and F. C. Piper, eds.,
Oxford University Press, 1989, 189201.

L. Czirimaz,
The size of a share must be large,
Journal of Cryptology 10
(1997), 223231.
[Preliminary version appeared
in "Advances in Cryptology  EUROCRYPT '94",
A. De Santis, ed.,
Lecture Notes in Computer Science 950
(1995), 1322.]

L. Czirimaz,
The dealer's random bits in secret sharing schemes,
Studia Sci. Math. Hungar. 32
(1996), 429437.

G. I. Davida, R. DeMillo and R. Lipton,
Protecting shared cryptographic keys,
in "Proceedings of the 1980 Symposium on
Security and Privacy",
IEEE Press, 1980, 100102.

E. Dawson and D. Donovan,
Shamir's scheme says it all,
in "Computer Security",
E. G. Dougall, ed.,
NorthHolland, 1993, 91102.

E. Dawson and D. Donovan,
The breadth of Shamir's secret sharing scheme,
Computers and Security 13 (1994),
6978.

E. Dawson, E. S. Mahmoodian and A. Rahilly,
Orthogonal arrays and ordered threshold schemes,
Australasian Journal of Combinatorics 8 (1993),
2744.

J. Denes and A. D. Keedwell,
On GolombPosner codes and a remark of
W. W. Wu about secretsharing systems,
IEEE Trans. Comm. 38 (1990),
261262.

A. De Santis, Y. Desmedt and Y. Frankel,
How to share a function securely,
in "26th Annual Symposium on
Theory of Computing", ACM Press, 1994, 522533.

A. De Santis, G. Di Crescenzo and G. Persiano,
Secret sharing and perfect zero knowledge,
in "Advances in Cryptology  CRYPTO '93",
D. R. Stinson, ed.,
Lecture Notes in Computer Science 773
(1994), 7384.

Y. Desmedt,
Threshold cryptography,
European Transactions on Telecommunications 5
(1994), 449457.

Y. Desmedt and Y. Frankel,
Threshold cryptosystems,
in "Advances in Cryptology  CRYPTO '89",
G. Brassard, ed.,
Lecture Notes in Computer Science 435
(1990), 307315.

Y. Desmedt and Y. Frankel,
Shared generation of authenticators and signatires,
in "Advances in Cryptology  CRYPTO '91",
J. Feigenbaum, ed.,
Lecture Notes in Computer Science 576
(1992), 457469.

Y. Desmedt and Y. Frankel,
Homomorphic zeroknowledge threshold schemes over any finite
abelian group,
SIAM Journal of Discrete Mathematics 7
(1994), 667679.
[Preliminary version appeared
in "Sequences II: Methods in Communication, Security and Computer
Science",
R. Capocelli and A. De Santis, eds., Springer Verlag,
1993, 369378.]

Y. Desmedt, Y. Frankel and M. Yung,
Multireciever/multisender network security:
efficient authenticated multicast/feedback,
in "IEEE INFOCOM '92",
IEEE Press, 1992, 20452054.

Y. Desmedt, G. di Crescenzo and M. Burmester,
Multiplicative nonabelian sharing schemes and their
application to threshold cryptography,
in "Advances in Cryptology  ASIACRYPT '94",
J. Pieprzyk and R. SafaviNaini, eds.,
Lecture Notes in Computer Science 917
(1995), 2132.

M. De Soete,
Geometric threshold schemes,
in "Geometries, Codes and Cryptography",
G. Longo, M. Marchi and A. Sgarro, eds.,
CISM Courses and Lectures No. 313,
SpringerVerlag, 1990, 201212.

M. De Soete and K. Vedder,
Some new classes of geometric threshold schemes,
in "Advances in Cryptology  EUROCRYPT '88",
C. G. Gunther, ed.,
Lecture Notes in Computer Science 330
(1988), 389401.

M. van Dijk,
On the information rate of perfect secret sharing schemes,
Designs, Codes and Cryptography 6
(1995), 143169.

M. van Dijk,
More information theoretical inequalities
to be used in secret sharing?,
Information Processing Letters 63
(1997), 4144.

M. van Dijk,
A linear construction of secret sharing schemes,
Designs, Codes and Cryptography 12
(1997), 161201.
[Preliminary version appeared in
"Advances in Cryptology  EUROCRYPT '94",
A. De Santis, ed.,
Lecture Notes in Computer Science 950
(1995), 2334. ]

M. van Dijk, W.A. Jackson and K. M. Martin,
A note on duality in linear secret sharing schemes,
Bulletin of the Institute
of Combinatorics and its Applications 19
(1997), 93101.

D. Donovan,
Some interesting constructions for secret sharing schemes,
Australasian Journal of Combinatorics 9
(1994), 3765.

S. Droste,
New results on visual cryptography,
in "Advances in Cryptology  CRYPTO '96",
N. Koblitz, ed.,
Lecture Notes in Computer Science 1109
(1996), 401415.

C. Dwork,
On verification in secret sharing,
in "Advances in Cryptology  CRYPTO '91",
J. Feigenbaum, ed.,
Lecture Notes in Computer Science 576
(1992), 114128.

C. Dwork,
Strong verifiable secret sharing,
in "Proceedings of the 4th International Workshop on
Distributed Algorithms",
Lecture Notes in Computer Science 486
(1991), 213227.

T. Etzion,
On threshold schemes from large sets,
J. Combin. Des. 4
(1996), 323338.

P. Feldman,
A practical scheme for noninteractive verifiable secret sharing,
in "Proceedings of the 28th IEEE Symposium on the
Foundations of Computer Science", IEEE Press, 1987, 427437.

P. Feldman and S. Micali,
Optimal algorithms for Byzantine agreement,
in:" Proc. 20th Annual Symp. on Theory of Computing, ACM,
(1988), 148161.

Y. Frankel and Y. Desmedt,
Classification of ideal homomorphic threshold schemes over finite abelian
groups,
in "Advances in Cryptology  EUROCRYPT '92",
R. A. Rueppel, ed.,
Lecture Notes in Computer Science 658
(1993), 2534.

Y. Frankel, Y. Desmedt and M. Burmester,
Nonexistence of homomorphic general sharing schemes
for some key spaces,
in "Advances in Cryptology  CRYPTO '92",
E. F. Brickell, ed.,
Lecture Notes in Computer Science 740
(1993), 549557.

M. K. Franklin and M. K. Reiter,
Verifiable signature sharing,
in "Advances in Cryptology  EUROCRYPT '95",
L. C. Guillou and J.J. Quisquater, eds.,
Lecture Notes in Computer Science 921
(1995), 5063.

R. Gennaro and S. Micali,
Verifiable secret sharing as secure computation,
in "Advances in Cryptology  EUROCRYPT '95",
L. C. Guillou and J.J. Quisquater, eds.,
Lecture Notes in Computer Science 921
(1995), 168182.

R. Gennaro M. O. Rabin, and T. Rabin,
Simplified VSS and fasttrack multiparty computations with applications to
threshold
cryptography,
in: " Proc. of 1998 ACM Symp. on Priciples of Distributed Computing", to
appear.

H. Ghodosi, J. Pieprzyk and SafaviNaini,
Remarks on the multiple assignment secret sharing scheme,
Lecture Notes in Computer Science
1334 (1997), 7282.

O. Goldreich, S. Micali and A. Wigderson,
Proofs that yield nothing but their validity or all languages in NP have
zeroknowledge proof systems,
J. ACM 38(1991), 691729.

J. Dj. Golic,
On matroid characterization of ideal secret sharing schemes,
J. Cryptology 11 (1998), 7586.

S. Harari,
Secret sharing systems,
in "Secure Digital Communications",
G. Longo, ed.,
CISM Courses and Lectures No. 279,
SpringerVerlag, 1983, 105110.

S. Harari,
Application des codes correcteurs au partage du secret,
Traitement Signal 4
(1987), 353356.

L. Harn and H.Y. Lin,
An lspan generalized secret sharing scheme,
in "Advances in Cryptology  CRYPTO '92",
E. F. Brickell, ed.,
Lecture Notes in Computer Science 740
(1993), 558565.

J. He and E. Dawson,
Multistage secret sharing based on oneway function,
Electronics Letters 30
(1994), 15911592.

J. He and E. Dawson,
Multisecretsharing scheme based on oneway function,
Electronics Letters 31
(1995), 9395.

J. He and E. Dawson,
How to fairly reconstruct a shared secret,
in "Cryptography: Policy and Algorithms",
Lecture Notes in Computer Science 1029
(1996), 115124.

A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung,
Proactive secret sharing or how to cope with perpetual leakage,
in "Advances in Cryptology  CRYPTO '95",
D. Coppersmith, ed.,
Lecture Notes in Computer Science 963
(1995), 339352.

T. Hofmeister, M. Krause and H. U. Simon,
Contrastoptimal k out of n secret sharing schemes
in visual cryptography, to be presented at
"COCOON '97".

S.J. Hwang and C.C. Chang,
A dynamic secret sharing scheme with cheater detection,
in "Information Security and Privacy '96",
J. Pieprzyk and J. Seberry, eds.,
Lecture Notes in Computer Science 1172
(1996), 4855.

T. Hwang,
Protocols for group oriented secret sharing,
Information Processing Letters 42
(1992), 179182.

I. Ingemarsson and G. J. Simmons,
A protocol to set up shared secret schemes without the
assistance of a mutually trusted party,
in "Advances in Cryptology  EUROCRYPT '90",
I. B. Damgard, ed.,
Lecture Notes in Computer Science 473
(1991), 266282.

M. Ito, A. Saito and T. Nishizeki,
Secret sharing scheme realizing general access structure,
in "Proceedings of the IEEE Global Telecommunications
Conference, Globecom '87", IEEE Press, 1987, 99102.

M. Ito, A. Saito and T. Nishizeki,
Secret sharing scheme realizing general access structure,
Electron. Comm. Japan Part III Fund. Electron. Sci.
72 (1989), 5663.

M. Ito, A. Saito and T. Nishizeki,
Multiple assignment scheme for sharing secret,
J. Cryptology 6 (1993), 1520.

W.A. Jackson and K. M. Martin,
Cumulative arrays and geometric secret sharing schemes,
in "Advances in Cryptology  AUSCRYPT '92",
J. Seberry and Y. Zheng, eds.,
Lecture Notes in Computer Science 718
(1993), 4855.

W.A. Jackson and K. M. Martin,
Geometric secret sharing schemes and their duals,
Designs, Codes and Cryptography 4 (1994),
8395.

W.A. Jackson and K. M. Martin,
Combinatorial models for perfect secret sharing schemes,
to appear in
Journal of Combinatorial Mathematics and Combinatorial Computing.

W.A. Jackson and K. M. Martin,
Efficient constructions for one sharing of many secrets,
Australasian Journal of Combinatorics 14 (1996),
283296.

W.A. Jackson and K. M. Martin,
A combinatorial interpretation of ramp schemes,
Australasian Journal of Combinatorics 14 (1996),
5160.

W.A. Jackson and K. M. Martin,
Perfect secret sharing schemes on five participants,
Designs, Codes and Cryptography 9
(1996), 267286.

W.A. Jackson, K. M. Martin and C. M. O'Keefe,
Multisecret threshold schemes,
in "Advances in Cryptology  CRYPTO '93",
D. R. Stinson, ed.,
Lecture Notes in Computer Science 773
(1994), 126135.

W.A. Jackson, K. M. Martin and C. M. O'Keefe,
On sharing many secrets,
in "Advances in Cryptology  ASIACRYPT '94",
J. Pieprzyk and R. SafaviNaini, eds.,
Lecture Notes in Computer Science 917
(1995), 4254.

W.A. Jackson, K. M. Martin and C. M. O'Keefe,
Efficient secret sharing without a mutually trusted authority,
in "Advances in Cryptology  EUROCRYPT '95",
L. C. Guillou and J.J. Quisquater, eds.,
Lecture Notes in Computer Science 921
(1995), 183193.

W.A. Jackson, K. M. Martin and C. M. O'Keefe,
A construction for multisecret threshold schemes,
Designs, Codes and Cryptography 9
(1996), 287303.

W.A. Jackson, K. M. Martin and C. M. O'Keefe,
Ideal secret sharing schemes with multiple secrets,
Journal of Cryptology 9
(1996), 233250.

W.A. Jackson, K. M. Martin and C. M. O'Keefe,
Mutually trusted authorityfree secret sharing schemes,
Journal of Cryptology 10
(1997), 261289.

E. D. Karnin, J. W. Greene and M. E. Hellman,
On secret sharing systems,
IEEE Transactions on Information Theory 29
(1983), 3541.

S. C. Kothari,
Generalized linear threshold scheme,
in "Advances in Cryptology  CRYPTO '84",
G. R. Blakley and D. Chaum, eds.,
Lecture Notes in Computer Science 196
(1985), 231241.

K. Koyama,
Cryptographic key sharing methods for multigroups and security analysis,
Transactions of the IECE Japan E66
(1983), 1320.

H. Krawczyk,
Secret sharing made short,
in "Advances in Cryptology  CRYPTO '93",
D. R. Stinson, ed.,
Lecture Notes in Computer Science 773
(1994), 136146.

K. Kurosawa, S. Obana and W. Ogata,
tcheater identifiable (k,n) threshold secret sharing schemes,
in "Advances in Cryptology  CRYPTO '95",
D. Coppersmith, ed.,
Lecture Notes in Computer Science 963
(1995), 410423.

K. Kurosawa and K. Okada,
Combinatorial interpretation of secret sharing schemes,
in "Advances in Cryptology  ASIACRYPT '94",
J. Pieprzyk and R. SafaviNaini, eds.,
Lecture Notes in Computer Science 917
(1995), 5564.

K. Kurosawa and K. Okada,
Combinatorial lower bounds for secret sharing schemes,
Information Processing
Letters 60
(1996), 301304. [This is a revised version of
the previous paper.]

K. Kurosawa, K. Okada, K. Sakano, W. Ogata and S. Tsujii,
Nonperfect secret sharing schemes and matroids,
in "Advances in Cryptology  EUROCRYPT '93",
T. Helleseth, ed.,
Lecture Notes in Computer Science 765
(1994), 126141.

C.S. Laih, L. Harn, J.Y. Lee and T. Hwang,
Dynamic threshold scheme based on the definition of a
crossproduct in an ndimensional linear space,
in "Advances in Cryptology  CRYPTO '89",
G. Brassard, ed.,
Lecture Notes in Computer Science 435
(1990), 286298.

C. Laih, J. Lee and L. Harn,
A new threshold scheme and its applications in designing the
conference key distribution cryptosystem,
Information Processing Letters 32 (1989), 9599.

H.Y. Lin and L. Harn,
A generalized secret sharing scheme with cheater detection,
in "Advances in Cryptology  ASIACRYPT '91",
H. Imai, R. L. Rivest and T. Matsumoto, eds.,
Lecture Notes in Computer Science 739
(1993), 149158.

H.Y. Lin and L. Harn,
Fair reconstruction of a secret,
Information Processing Letters 55
(1995), 4548.

P. L. Lin and J. G. Dunham,
A secret sharing model: GS^3,
IEE Electronics Letters 30
(1994), 21162118.

W. Mao,
Necessity and relization of universally verifiable secret sharing,
in: "IEEE Symp. on Security and Privacy", to appear.

K. M. Martin,
Untrustworthy participants in perfect secret sharing schemes,
in "Cryptography and Coding III",
M. J. Ganley, ed.,
Oxford University Press, 1993, 255264.

K. M. Martin,
New secret sharing schemes from old,
Journal of Combinatorial Mathematics and Combinatorial Computing
14 (1993), 6577.

J. L. Massey,
Minimal codewords and secret sharing,
in "Proceedings of the 6th Joint SwedishRussian International
Workshop on Information Theory",
(1993), 276279.

J. L. Massey,
Some applications of coding theory in cryptography,
in "Cryptography and Coding IV",
Oxford University Press, 1995, 3347.

A. Mayer and M. Yung,
Generalized secret sharing and groupkey distribution
using short keys,
Pro. Sequences '97.

R. J. McEliece and D. Sarwate,
On sharing secrets and ReedSolomon codes,
Communications of the ACM
24 (1981), 583584.

C. Meadows,
Some threshold schemes without central key distributors,
Congressus Numerantium 46 (1985), 187199.

S. Micali,
Fair publickey cryptosystems,
in "Advances in Cryptology  CRYPTO '92",
E. F. Brickell, ed.,
Lecture Notes in Computer Science 740 (1993), 113138.

S. Micali and T. Rabin,
Collective coin tossing without assumptions nor broadcasting,
in "Advances in Cryptology  CRYPTO '90",
A. J. Menezes and S. A. Vanstone, eds.,
Lecture Notes in Computer Science 537
(1991), 253266.

M. Mignotte,
How to share a secret,
in "Cryptography Proceedings,
Burg Feuerstein 1982",
T. Beth, ed.,
Lecture Notes in Computer Science 149 (1983), 371375.

C. J. Mitchell, F. C. Piper, M. Walker and P. Wild,
Authentication schemes, perfect local randomizers,
perfect secrecy and secret sharing schemes,
Designs, Codes and Cryptography 7 (1996), 101110.

M. Naor and B. Pinkas,
Visual authentication and identification,
in "Advances in Cryptology  CRYPTO '97",
B. Kaliski, Jr., ed.,
Lecture Notes in Computer Science 1294
(1997), 322336.

M. Naor and A. Shamir,
Visual cryptography,
in "Advances in Cryptology  EUROCRYPT '94",
A. De Santis, ed.,
Lecture Notes in Computer Science 950 (1995), 112.

M. Naor and A. Shamir,
Visual cryptography II: improving the constrast via the cover base,
in "Security Protocols",
M. Lomas, ed.,
Lecture Notes in Computer Science 1189 (1997), 197202.

M. Naor and A. Wool,
Access control and signatures
via quorum secret sharing,
in
"3rd ACM Conference on Communication and Computer Security",
1996.

S. Obana and K. Kurosawa,
Veto is impossible in secret sharing schemes,
Information Processing Letters 58 (1996), 293295.

W. Ogata and K. Kurosawa,
Optimum secret sharing scheme secure against cheating,
in "Advances in Cryptology  EUROCRYPT '96",
U. Maurer, ed.,
Lecture Notes in Computer Science 1070 (1996), 200211.

W. Ogata, K. Kurosawa and S. Tsujii,
Nonperfect secret sharing schemes,
in "Advances in Cryptology  AUSCRYPT '92",
J. Seberry and Y. Zheng, eds.,
Lecture Notes in Computer Science 718
(1993), 5666.

K. Okada and K. Kurosawa,
Lower bound on the size of shares of nonperfect
secret sharing schemes,
in "Advances in Cryptology  ASIACRYPT '94",
J. Pieprzyk and R. SafaviNaini, eds.,
Lecture Notes in Computer Science
(1995), 3341.

K. Okada, W. Ogata, K. Sakano and K. Kurosawa,
Analysis on
secret sharing schemes
with nongraphical access structures,
IEICE Transactions Fundamentals, E80A (1997), 8589.

C. M. O'Keefe,
Applications of finite geometries to information security,
Australasian Journal of Combinatorics 7 (1993), 195212.

R. Ostrosky and M. Yung,
How to withstand mobile virus attacks,
in: " ACM Symp. on Priciples of Distributed Computing",
(1991), 5159.

T. P. Pedersen,
Noninteractive and informationtheoretic secure
verifiable secret sharing,
in "Advances in Cryptology  CRYPTO '91",
J. Feigenbaum, ed.,
Lecture Notes in Computer Science 576
(1992), 129140.

S. J. Phillips and N. C. Phillips,
Strongly ideal secret sharing schemes,
J. Cryptology 5 (1992), 185191.

R. G. E. Pinch,
Online multiple secret sharing,
Electronics Letters 32 (1996), 10871088.

T. Rabin,
Robust sharing of secrets when the dealer is honest or cheating,
Journal of the ACM 41 (1994), 10891109.

T. Rabin and M. BenOr, Verifiable secret sharing and multiparty
protocols with honest majority,
in "21st Annual Symposium on
Theory of Computing", ACM Press, 1989, 7385.

A. Renvall and C. Ding,
A nonlinear secret sharing scheme,
in "Information Security and Privacy '96",
J. Pieprzyk and J. Seberry, eds.,
Lecture Notes in Computer Science 1172
(1996), 5666.

A. Renvall and C. Ding,
The access structure of some secret sharing schemes,
in "Information Security and Privacy '96",
J. Pieprzyk and J. Seberry, eds.,
Lecture Notes in Computer Science 1172
(1996), 6778.

J. RifaComa,
How to avoid the cheaters succeeding in the key sharing scheme,
Designs, Codes and Cryptography 3 (1993), 221228.

P. J. Schellenberg and D. R. Stinson,
Threshold schemes from combinatorial designs,
Journal of Combinatorial Mathematics and Combinatorial
Computing 5 (1989),
143160.

P. D. Seymour,
On secret sharing matroids,
Journal of Combinatorial Theory B 56 (1992), 6973.

A. Shamir,
How to share a secret,
Communications of the ACM 22 (1979), 612613.

S. P. Shieh and H. M. Sun,
On constructing secret sharing schemes,
in "Infocom '94 Proceedings",
IEEE Press, 1994, 12881292.

G. J. Simmons,
How to (really) share a secret,
in "Advances in Cryptology  CRYPTO '88",
S. Goldwasser, ed.,
Lecture Notes in Computer Science 403
(1989), 390448.

G. J. Simmons,
Prepositioned shared secret and/or shared control schemes,
in "Advances in Cryptology  EUROCRYPT '89",
J.J. Quisquater and J. Vandewalle, eds.,
Lecture Notes in Computer Science 434
(1990), 436467.

G. J. Simmons,
Robust secret sharing schemes or "How to be sure you have the right
answer even though you don't know the question",
Congressus Numerantium 68 (1989), 215248.

G. J. Simmons,
Geometric shared secret and/or shared control schemes,
in "Advances in Cryptology  CRYPTO '90",
A. J. Menezes and S. A. Vanstone, eds.,
Lecture Notes in Computer Science 537
(1991), 216241.

G. J. Simmons,
An introduction to shared secret and/or shared control schemes
and their application,
in "Contemporary Cryptology, The Science of Information Integrity",
G. J. Simmons, ed.,
IEEE Press, 1992, 441497.

G. J. Simmons,
The consequences of trust in shared secret schemes,
in "Advances in Cryptology  EUROCRYPT '93",
T. Helleseth, ed.,
Lecture Notes in Computer Science 765
(1994), 448452.

G. J. Simmons, W.A. Jackson and K. M. Martin,
The geometry of shared secret schemes,
Bulletin of the Institute of Combinatorics and its
Applications 1 (1991), 7188.

G. J. Simmons and C. Meadows,
The role of trust in information security protocols,
Journal of Computer Security 3 (1994/1995), 7184.

M. Stadler,
Publicly verifiable secret sharing,
in "Advances in Cryptology  EUROCRYPT '96",
U. Maurer, ed.,
Lecture Notes in Computer Science 1070 (1996), 190199.

D. R. Stinson,
An explication of secret sharing schemes,
Designs, Codes and Cryptography 2 (1992), 357390.

D. R. Stinson,
New general lower bounds on the information rate of perfect secret
sharing schemes,
in "Advances in Cryptology  CRYPTO '92",
E. F. Brickell, ed.,
Lecture Notes in Computer Science 740 (1993), 168182.
 D. R. Stinson.
Combinatorial designs and cryptography,
in "Surveys in Combinatorics, 1993",
K. Walker, ed.,
Cambridge University Press, 1993, 257287.

D. R. Stinson,
Decomposition constructions for secret sharing schemes,
IEEE Transactions on Information Theory 40
(1994), 118125.

D. R. Stinson,
Visual cryptography and threshold schemes,
Dr. Dobb's Journal,,(1998), 3643.

D. R. Stinson and S. A. Vanstone,
A combinatorial approach to threshold schemes,
SIAM Journal of Discrete Mathematics 1 (1988), 230236.
[Preliminary version appeared in
"Advances in Cryptology  CRYPTO 87",
C. Pomerance, ed.,
Lecture Notes in Computer Science 293 (1988), 330339.]

H.M. Sun and B.L. Chen,
On the decomposition constructions for perfect secret sharing schemes,
in "Information and Communications Security,
Lecture Notes in Computer Science,
1334 (1997), 5060.

H.M. Sun and S.P. Shieh,
On dynamic threshold schemes,
Information Processing Letters 52 (1994), 201206.

H.M. Sun and S.P. Shieh,
An efficient construction of perfect secret sharing schemes
for graphbased access structures,
Computers and Mathematics with Applictions
31 (1996), 129135.

M. Tompa and H. Woll,
How to share a secret with cheaters,
J. Cryptology 1 (1988), 133138.
[Preliminary version appeared in
"Advances in Cryptology  CRYPTO '86",
A. M. Odlyzko, ed.,
Lecture Notes in Computer Science 263 (1987), 261265.]

T. Uehara, T. Nishizeki, E. Okamoto and K. Nakamura,
A secret sharing system with matroidal access structure,
Transactions of the IECE Japan J69A 9 (1986), 11241132.

H. Unterwalcher,
A department threshold scheme based on algebraic equations,
Contributions to General Algebra 6 (1988), 287298.

E. R. Verheul and H. C. A. van Tilborg,
Constructions and properties of k out of n
visual secret sharing schemes,
Designs, Codes and Cryptography 11 (1997), 179196.

W. D. Wallis,
Not all perfect extrinsic secret sharing schemes are ideal,
Australasian Journal of Combinatorics 2 (1990), 237238.

T.C. Wu and W.H. He,
A geometric approach for sharing secrets,
Computers and Security 14 (1995), 135146.

T.C. Wu and T.S. Wu,
Cheating detection and cheater identification
in secret sharing schemes,
IEE Transactions on Computers and
Digital Techniques 142 (1995), 367369.

H. Yamamoto,
On secret sharing systems using (k,L,n)threshold scheme,
Transactions of the IECE Japan J68A (1985), 945952.

H. Yamamoto,
Secret sharing system using (k,L,n)threshold scheme,
Electron. Comm. Japan Part I Comm.
69 (1986), 4664.

X. B. Zhang,
Constructions for perfect threshold schemes,
in "Combinatorics and Graph Theory",
H. P. Yap, T. H. Ku, E. K. Lloyd and Z. M. Wang, eds.,
World Scientific, 1993, 8790.

Y. Zheng, T. Hardjono and J. Seberry,
Reusing shares in secret sharing schemes,
The Computer Journal 37 (1994), 199205.

Y. Zheng, T. Hardjono and J. Seberry,
How to recycle shares in secret sharing schemes,
Austral. Comput. Sci. Comm. 14 (1992), 10531064.
Back to Doug Stinson's home page:
click here
FirstInitialLastName@uwaterloo.ca