메뉴 건너뛰기




Volumn 13, Issue 3, 2000, Pages 324-345

Computing functions of a shared secret

Author keywords

Broadcast channel; Interaction; Private channels; Private computations; Secret sharing

Indexed keywords


EID: 0012096118     PISSN: 08954801     EISSN: None     Source Type: Journal    
DOI: 10.1137/S0895480195288819     Document Type: Article
Times cited : (13)

References (38)
  • 3
    • 33745511846 scopus 로고
    • Hiding instances in multioracle queries
    • STACS '90, Proceedings of the 7th Annual Symposium on Theoretical Aspects of Computer Science, C. Choffrut and T. Lengauer, eds., Springer-Verlag, New York
    • D. BEAVER AND J. FEIGENBAUM, Hiding instances in multioracle queries, in STACS '90, Proceedings of the 7th Annual Symposium on Theoretical Aspects of Computer Science, C. Choffrut and T. Lengauer, eds., Lecture Notes in Comput. Sci. 415, Springer-Verlag, New York, 1990, pp. 37-48.
    • (1990) Lecture Notes in Comput. Sci. , vol.415 , pp. 37-48
    • Beaver, D.1    Feigenbaum, J.2
  • 4
    • 0028429265 scopus 로고
    • Universally ideal secret sharing schemes
    • A. BEIMEL AND B. CHOR, Universally ideal secret sharing schemes. IEEE Trans. Inform. Theory, 40 (1994), pp. 786-794.
    • (1994) IEEE Trans. Inform. Theory , vol.40 , pp. 786-794
    • Beimel, A.1    Chor, B.2
  • 6
    • 85034837254 scopus 로고
    • Secret sharing homomorphisms: Keeping shares of a secret secret
    • Advances in Cryptoiogy - CRYPTO '86, A. M. Odlyzko, ed., Springer-Verlag, New York
    • J. BENALOH. Secret sharing homomorphisms: Keeping shares of a secret secret, in Advances in Cryptoiogy - CRYPTO '86, A. M. Odlyzko, ed., Lecture Notes in Computer Sci. 263, Springer-Verlag, New York, 1987, pp. 251-260.
    • (1987) Lecture Notes in Computer Sci. , vol.263 , pp. 251-260
    • Benaloh, J.1
  • 7
    • 85027202957 scopus 로고
    • Generalized secret sharing and monotone functions
    • Advances in Cryptoiogy - CRYPTO '88, S. Goldwasser, ed., Springer-Verlag, New York
    • J. BENALOH AND J. LEICHTER, Generalized secret sharing and monotone functions, in Advances in Cryptoiogy - CRYPTO '88, S. Goldwasser, ed., Lecture Notes in Comput. Sci. 403, Springer-Verlag, New York, 1990, pp. 27-35.
    • (1990) Lecture Notes in Comput. Sci. , vol.403 , pp. 27-35
    • Benaloh, J.1    Leichter, J.2
  • 8
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • Proceedings of the 1979 AFIPS National Computer Conference, R. E. Merwin, J. T. Zanca, and M. Smith, AFIPS Press, Montvale, NJ
    • G. R. BLAKLEY, Safeguarding cryptographic keys, in Proceedings of the 1979 AFIPS National Computer Conference, R. E. Merwin, J. T. Zanca, and M. Smith, AFIPS Conference Proceedings 48, AFIPS Press, Montvale, NJ, 1979, pp. 313-317.
    • (1979) AFIPS Conference Proceedings , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 9
    • 84961369151 scopus 로고
    • The security of ramp schemes
    • Advances in Cryptology - CRYPTO '84, G. R. Blakley and D. Chaum, eds., Springer-Verlag, New York
    • G. R. BLAKLEY AND C. MEADOWS, The security of ramp schemes, in Advances in Cryptology - CRYPTO '84, G. R. Blakley and D. Chaum, eds., Lecture Notes in Comput. Sci. 196, Springer-Verlag, New York, 1985, pp. 242-268.
    • (1985) Lecture Notes in Comput. Sci. , vol.196 , pp. 242-268
    • Blakley, G.R.1    Meadows, C.2
  • 10
    • 85005949623 scopus 로고
    • Multisecret sharing schemes
    • Advances in Cryptology - CRYPTO '94, Y. Desmedt, ed., Springer-Verlag, New York
    • C. BLUNDO, A. DE SANTIS, G. DI CRESCENZO, A. GIORGIO GAGGIA, AND U. VACCARO, Multisecret sharing schemes, in Advances in Cryptology - CRYPTO '94, Y. Desmedt, ed., Lecture Notes in Comput. Sci. 839, Springer-Verlag, New York, 1994, pp. 150-163.
    • (1994) Lecture Notes in Comput. Sci. , vol.839 , pp. 150-163
    • Blundo, C.1    De Santis, A.2    Di Crescenzo, G.3    Giorgio Gaggia, A.4    Vaccaro, U.5
  • 11
    • 33749269532 scopus 로고
    • Efficient sharing of many secrets
    • STACS '93, P. Enjalbert, A. Finkel, and K. W. Wagner, eds., Springer-Verlag, New York
    • C. BLUNDO, A. DE SANTIS, AND U. VACCARO, Efficient sharing of many secrets, in STACS '93, P. Enjalbert, A. Finkel, and K. W. Wagner, eds., Lecture Notes in Comput. Sci. 665, Springer-Verlag, New York, 1993, pp. 692-703.
    • (1993) Lecture Notes in Comput. Sci. , vol.665 , pp. 692-703
    • Blundo, C.1    De Santis, A.2    Vaccaro, U.3
  • 13
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E. F. BRICKELL AND D. M. DAVENPORT, On the classification of ideal secret sharing schemes, J. Cryptology, 4 (1991), pp. 123-134.
    • (1991) J. Cryptology , vol.4 , pp. 123-134
    • Brickell, E.F.1    Davenport, D.M.2
  • 14
    • 0026992660 scopus 로고
    • Some improved bounds on the information rate of perfect secret sharing schemes
    • E. F. BRICKELL AND D. R. STINSON, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology, 5 (1992), pp. 153-166.
    • (1992) J. Cryptology , vol.5 , pp. 153-166
    • Brickell, E.F.1    Stinson, D.R.2
  • 16
  • 18
    • 84985822377 scopus 로고
    • Threshold cryptosystems
    • Advances in Cryptology - AUSCRYPT '92, J. Seberry and Y. Zheng, eds., Springer-Verlag, New York
    • Y. DESMEDT, Threshold cryptosystems, in Advances in Cryptology - AUSCRYPT '92, J. Seberry and Y. Zheng, eds., Lecture Notes in Comput. Sci. 718, Springer-Verlag, New York, 1993, pp. 5-14.
    • (1993) Lecture Notes in Comput. Sci. , vol.718 , pp. 5-14
    • Desmedt, Y.1
  • 19
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • Advances in Cryptology - CRYPTO '91, J. Feigenbaum, ed., Springer-Verlag, New York
    • Y. DESMEDT AND Y. FRANKEL, Shared generation of authenticators and signatures, in Advances in Cryptology - CRYPTO '91, J. Feigenbaum, ed., Lecture Notes in Comput. Sci. 576, Springer-Verlag, New York, 1992, pp. 457-469.
    • (1992) Lecture Notes in Comput. Sci. , vol.576 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 20
    • 0000527282 scopus 로고
    • Homomorphic zero-knowledge threshold schemes over any finite abelian group
    • Y G. DESMEDT AND Y. FRANKEL, Homomorphic zero-knowledge threshold schemes over any finite abelian group, SIAM J. Discrete Math., 7 (1994), pp. 667-679.
    • (1994) SIAM J. Discrete Math. , vol.7 , pp. 667-679
    • Desmedt, Y.G.1    Frankel, Y.2
  • 22
    • 0023543848 scopus 로고
    • Secret sharing schemes realizing general access structure
    • IEEE Press, Piscataway, NJ
    • M. ITO, A. SAITO, AND T. NISHIZEKI, Secret sharing schemes realizing general access structure, in Proceedings of the IEEE Global Telecommunication Conference, Globecom '87, IEEE Press, Piscataway, NJ, 1987, pp. 99-102. Journal version: Multiple assignment scheme for sharing secret, J. Cryptology, 6 (1993), pp. 15-20.
    • (1987) Proceedings of the IEEE Global Telecommunication Conference, Globecom '87 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 23
    • 0027289776 scopus 로고
    • Multiple assignment scheme for sharing secret
    • Journal version
    • M. ITO, A. SAITO, AND T. NISHIZEKI, Secret sharing schemes realizing general access structure, in Proceedings of the IEEE Global Telecommunication Conference, Globecom '87, IEEE Press, Piscataway, NJ, 1987, pp. 99-102. Journal version: Multiple assignment scheme for sharing secret, J. Cryptology, 6 (1993), pp. 15-20.
    • (1993) J. Cryptology , vol.6 , pp. 15-20
  • 24
    • 84966614707 scopus 로고
    • Multisecret threshold schemes
    • Advances in Cryptology - CRYPTO '93, D. R. Stinson, ed., Springer-Verlag, New York
    • W. JACKSON, K. M. MARTIN, AND C. M. O'KEEFE, Multisecret threshold schemes, in Advances in Cryptology - CRYPTO '93, D. R. Stinson, ed., Lecture Notes in Comput. Sci. 773, Springer-Verlag, New York, 1994, pp. 126-135.
    • (1994) Lecture Notes in Comput. Sci. , vol.773 , pp. 126-135
    • Jackson, W.1    Martin, K.M.2    O'Keefe, C.M.3
  • 25
    • 84955590494 scopus 로고
    • On sharing many secrets
    • ASIACRYPT '94, J. Pieprzyk and R. Safavi-Naini, eds., Springer-Verlag, New York
    • W. JACKSON, K. M. MARTIN, AND C. M. O'KEEFE, On sharing many secrets, in ASIACRYPT '94, J. Pieprzyk and R. Safavi-Naini, eds., Lecture Notes in Comput. Sci. 917, Springer-Verlag, New York, 1995, pp. 42-54.
    • (1995) Lecture Notes in Comput. Sci. , vol.917 , pp. 42-54
    • Jackson, W.1    Martin, K.M.2    O'Keefe, C.M.3
  • 26
    • 0013229183 scopus 로고    scopus 로고
    • Ideal secret sharing schemes with multiple secrets
    • W. JACKSON, K. M. MARTIN, AND C. M. O'KEEFE, Ideal secret sharing schemes with multiple secrets, J. Cryptology, 9 (1996), pp. 233-250.
    • (1996) J. Cryptology , vol.9 , pp. 233-250
    • Jackson, W.1    Martin, K.M.2    O'Keefe, C.M.3
  • 28
    • 85037464261 scopus 로고
    • Private communication
    • J. KILIAN AND N. NISAN, Private communication, 1990.
    • (1990)
    • Kilian, J.1    Nisan, N.2
  • 29
    • 85023433586 scopus 로고
    • Generalized linear threshold scheme
    • Advances in Cryptology - CRYPTO '84, G. R. Blakley and D. Chaum, eds., Springer-Verlag, New York
    • S. C. KOTHARI, Generalized linear threshold scheme, in Advances in Cryptology - CRYPTO '84, G. R. Blakley and D. Chaum, eds., Lecture Notes in Comput. Sci. 196, Springer-Verlag, New York, 1985, pp. 231-241.
    • (1985) Lecture Notes in Comput. Sci. , vol.196 , pp. 231-241
    • Kothari, S.C.1
  • 30
    • 0002365530 scopus 로고
    • Privacy and communication complexity
    • E. KUSHILEVITZ, Privacy and communication complexity, SIAM J. Discrete Math., 5 (1992), pp. 273-284.
    • (1992) SIAM J. Discrete Math. , vol.5 , pp. 273-284
    • Kushilevitz, E.1
  • 31
    • 0019608784 scopus 로고
    • On sharing secrets and Reed-Solomon codes
    • R. J. MCELIECE AND D. V. SARWATE, On sharing secrets and Reed-Solomon codes, Comm. ACM, 24 (1981), pp. 583-584.
    • (1981) Comm. ACM , vol.24 , pp. 583-584
    • Mceliece, R.J.1    Sarwate, D.V.2
  • 33
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, eds., Academic Press, New York
    • R. L. RIVEST, L. ADLEMAN, AND M. L. DERTOUZOS, On data banks and privacy homomorphisms, in Foundations of Secure Computation, R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, eds., Academic Press, New York, 1978, pp. 169-179.
    • (1978) Foundations of Secure Computation , pp. 169-179
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3
  • 34
    • 38249009286 scopus 로고
    • On secret-sharing matroids
    • P. D. SEYMOUR, On secret-sharing matroids, J. Combin. Theory Ser. B, 56 (1992), pp. 69-73.
    • (1992) J. Combin. Theory Ser. B , vol.56 , pp. 69-73
    • Seymour, P.D.1
  • 35
    • 0018545449 scopus 로고
    • How to share a secret
    • A. SHAMIR, How to share a secret, Comm. ACM, 22 (1979), pp. 612-613.
    • (1979) Comm. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 36
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control and their application
    • The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, Piscataway, NJ
    • G. J. SIMMONS, An introduction to shared secret and/or shared control and their application, in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, Piscataway, NJ, 1992, pp. 441-497.
    • (1992) Contemporary Cryptology , pp. 441-497
    • Simmons, G.J.1
  • 38
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • D. R. STINSON, An explication of secret sharing schemes, Des. Codes Cryptogr., 2 (1992), pp. 357-390.
    • (1992) Des. Codes Cryptogr. , vol.2 , pp. 357-390
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.