Carles Padro
Cited by
Cited by
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
R Cramer, Y Dodis, S Fehr, C Padró, D Wichs
Annual International Conference on the Theory and Applications of …, 2008
Ideal multipartite secret sharing schemes
O Farràs, J Martí-Farré, C Padró
Journal of cryptology 25 (3), 434-463, 2012
Secret sharing schemes with bipartite access structure
C Padró, G Sáez
IEEE Transactions on Information Theory 46 (7), 2596-2604, 2000
Ideal hierarchical secret sharing schemes
O Farras, C Padró
IEEE transactions on information theory 58 (5), 3273-3286, 2012
On secret sharing schemes, matroids and polymatroids
J Martí-Farré, C Padró
Theory of Cryptography Conference, 273-290, 2007
Secret sharing schemes with detection of cheaters for a general access structure
S Cabello, C Padró, G Sáez
Designs, Codes and Cryptography 25, 175-188, 2002
On codes, matroids, and secure multiparty computation from linear secret-sharing schemes
R Cramer, V Daza, I Gracia, JJ Urroz, G Leander, J Martí-Farré, C Padró
IEEE Transactions on Information Theory 54 (6), 2644-2657, 2008
Weighted threshold secret sharing schemes
P Morillo, C Padró, G Sáez, JL Villar
Information processing letters 70 (5), 211-216, 1999
Matroids can be far from ideal secret sharing
A Beimel, N Livne, C Padró
Theory of Cryptography Conference, 194-212, 2008
Detection of cheaters in vector space secret sharing schemes
C Padro, G Sáez, JL Villar
Designs, Codes and cryptography 16, 75-85, 1999
Secret sharing schemes with three or four minimal qualified subsets
J Martí-Farré, C Padró
Designs, Codes and Cryptography 34, 17-34, 2005
On the information ratio of non-perfect secret sharing schemes
O Farràs, TB Hansen, T Kaced, C Padró
Algorithmica 79, 987-1013, 2017
Algebraic manipulation detection codes
R Cramer, S Fehr, C Padró
Science China Mathematics 56, 1349-1358, 2013
Multi-linear secret-sharing schemes
A Beimel, A Ben-Efraim, C Padró, I Tyomkin
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014
Finding lower bounds on the complexity of secret sharing schemes by linear programming
C Padró, L Vázquez, A Yang
Discrete applied mathematics 161 (7-8), 1072-1084, 2013
Lecture notes in secret sharing
C Padró
Cryptology ePrint Archive, 2012
Natural generalizations of threshold secret sharing
O Farras, C Padró, C Xing, A Yang
IEEE transactions on information theory 60 (3), 1652-1664, 2014
Secret sharing schemes on access structures with intersection number equal to one
J Martí-Farré, C Padró
Discrete Applied Mathematics 154 (3), 552-563, 2006
Improving the linear programming technique in the search for lower bounds in secret sharing
O Farràs, T Kaced, S Martín, C Padró
IEEE Transactions on Information Theory 66 (11), 7088-7100, 2020
Secret sharing, rank inequalities, and information inequalities
S Martin, C Padró, A Yang
IEEE Transactions on Information Theory 62 (1), 599-609, 2015
The system can't perform the operation now. Try again later.
Articles 1–20