Various notions of non-malleable secret sharing schemes have been consid...
Non-overlapping codes have been studied for almost 60 years. In such a c...
In this paper, we initiate a study of asymmetric all-or-nothing transfor...
A splitting BIBD is a type of combinatorial design that can be used to
c...
In this paper, we show a "direct" equivalence between certain authentica...
An ℓ-good sequencing of an STS(v) is a permutation of the points of
the ...
A repairable threshold scheme (which we abbreviate to RTS) is a
(τ,n)-th...
The purpose of this paper is to describe and analyze the Cayley-Purser
a...