메뉴 건너뛰기




Volumn 1, Issue 3, 1989, Pages 133-138

How to share a secret with cheaters

Author keywords

Cheating; Interpolation; Reconstruction; Secret sharing; Security

Indexed keywords

DATA TRANSMISSION; MATHEMATICAL TECHNIQUES--INTERPOLATION;

EID: 0024141971     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/BF02252871     Document Type: Article
Times cited : (321)

References (10)
  • 1
    • 84934161934 scopus 로고    scopus 로고
    • L. M. Adleman and M.-D. A. Huang, Recognizing primes in random polynomial time, Proc. 19th Annual ACM Symp. Theory Comput., pp. 462–469, May 1987.
  • 4
    • 84934161943 scopus 로고    scopus 로고
    • B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, Proc. 26th Symp. Found. Comp. Sci., pp. 383–395, October 1985.
  • 5
    • 84934161942 scopus 로고    scopus 로고
    • P. Feldman, A practical scheme for noninteractive verifiable secret sharing, Proc. 28th Symp. Found. Comp. Sci., pp. 427–437, October 1987.
  • 7
    • 84934161941 scopus 로고    scopus 로고
    • S. Goldwasser, S. Micali, and R. L. Rivest, A “paradoxical” solution to the signature problem, Proc. 25th Symp. Found. Comp. Sci., pp. 441–448, October 1984.
  • 9
    • 84934161940 scopus 로고    scopus 로고
    • M. O. Rabin, Randomized Byzantine generals, Proc. 24th Symp. Found. Comp. Sci., pp. 403–409, November 1983.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.