메뉴 건너뛰기




Volumn 154, Issue 2, 1996, Pages 283-306

On the information rate of secret sharing schemes

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; DATA STRUCTURES; GRAPH THEORY; OPTIMAL SYSTEMS; SECURITY OF DATA; SET THEORY; THEOREM PROVING;

EID: 0030569864     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/0304-3975(95)00065-8     Document Type: Article
Times cited : (45)

References (47)
  • 1
    • 85027202957 scopus 로고
    • Generalized Secret Sharing and Monotone Functions
    • S. Goldwasser, ed., Advances in Cryptology - CRYPTO 88, Springer, Berlin
    • J.C. Benaloh and J. Leichter, Generalized Secret Sharing and Monotone Functions, in: S. Goldwasser, ed., Advances in Cryptology - CRYPTO 88, Lecture Notes in Computer Science, Vol. 403 (Springer, Berlin, 1985) 27-35.
    • (1985) Lecture Notes in Computer Science , vol.403 , pp. 27-35
    • Benaloh, J.C.1    Leichter, J.2
  • 2
    • 0346870109 scopus 로고
    • How to say 'no'
    • Quisquater and Vandewalle eds., Advances in Cryptology -EUROCRYPT 89, Springer, Berlin
    • A. Beutelspacher, How to say 'no', in: Quisquater and Vandewalle eds., Advances in Cryptology -EUROCRYPT 89, Lecture Notes in Computer Science, Vol. 434 (Springer, Berlin, 1990) 491-496.
    • (1990) Lecture Notes in Computer Science , vol.434 , pp. 491-496
    • Beutelspacher, A.1
  • 4
    • 85028918825 scopus 로고
    • Threshold schemes with disenrollment
    • E. Brickell, ed., Advances in Cryptology - CRYPTO '92, Springer, Berlin
    • B. Blakley, G.R. Blakley, A.H. Chan, and J.L. Massey, Threshold schemes with disenrollment, in: E. Brickell, ed., Advances in Cryptology - CRYPTO '92, Lecture Notes in Computer Science, Vol. 740 (Springer, Berlin, 1993) 546-554.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 546-554
    • Blakley, B.1    Blakley, G.R.2    Chan, A.H.3    Massey, J.L.4
  • 6
    • 84996527783 scopus 로고
    • Fully Dynamic Secret Sharing Schemes
    • D.R. Stinson, ed., Advances in Cryptology - CRYPTO 93, Springer, Berlin
    • C. Blundo, A. Cresti, A. De Santis, and U. Vaccaro, Fully Dynamic Secret Sharing Schemes, in: D.R. Stinson, ed., Advances in Cryptology - CRYPTO 93, Lecture Notes in Computer Science, Vol. 773 (Springer, Berlin, 1994) 126-135.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 126-135
    • Blundo, C.1    Cresti, A.2    De Santis, A.3    Vaccaro, U.4
  • 8
    • 67349239234 scopus 로고
    • Secret Sharing Schemes with Veto Capabilities
    • C. Cohen, S. Litsyn, A. Lobstein and G. Zemor, eds., Proceedings of the French-Israeli Workshop in Algebraic Coding, Springer, Berlin
    • C. Blundo, A. De Santis, L. Gargano and U. Vaccaro, Secret Sharing Schemes with Veto Capabilities, in: C. Cohen, S. Litsyn, A. Lobstein and G. Zemor, eds., Proceedings of the French-Israeli Workshop in Algebraic Coding, Lecture Notes in Computer Science, Vol. 781 (Springer, Berlin, 1994) 82-89.
    • (1994) Lecture Notes in Computer Science , vol.781 , pp. 82-89
    • Blundo, C.1    De Santis, A.2    Gargano, L.3    Vaccaro, U.4
  • 10
    • 0029631974 scopus 로고
    • Graph decomposition and secret sharing schemes
    • C. Blundo, A. De Santis, D.R. Stinson and U. Vaccaro, Graph decomposition and secret sharing schemes, J. Cryptology 8 (1995) 39-64; preliminary version in: R. Rueppel, ed., Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, Vol. 658 (Springer, Berlin, 1993) 1-24.
    • (1995) J. Cryptology , vol.8 , pp. 39-64
    • Blundo, C.1    De Santis, A.2    Stinson, D.R.3    Vaccaro, U.4
  • 11
    • 0029631974 scopus 로고
    • Advances in Cryptology - EUROCRYPT '92, Springer, Berlin
    • C. Blundo, A. De Santis, D.R. Stinson and U. Vaccaro, Graph decomposition and secret sharing schemes, J. Cryptology 8 (1995) 39-64; preliminary version in: R. Rueppel, ed., Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, Vol. 658 (Springer, Berlin, 1993) 1-24.
    • (1993) Lecture Notes in Computer Science , vol.658 , pp. 1-24
    • Rueppel, R.1
  • 12
    • 33749269532 scopus 로고
    • Efficient sharing of many secrets
    • P. Enjalbert, A. Finkel and K.W. Wagner, eds., Proc. STACS '93 (10th Symp. on Theoretical Aspects of Computer Science), Springer, Berlin
    • C. Blundo, A. De Santis and U. Vaccaro, Efficient sharing of many secrets, in: P. Enjalbert, A. Finkel and K.W. Wagner, eds., Proc. STACS '93 (10th Symp. on Theoretical Aspects of Computer Science), Lecture Notes in Computer Science, Vol. 665 (Springer, Berlin, 1993) 692-703.
    • (1993) Lecture Notes in Computer Science , vol.665 , pp. 692-703
    • Blundo, C.1    De Santis, A.2    Vaccaro, U.3
  • 14
    • 85027395928 scopus 로고
    • Randomness in distribution protocols
    • S. Abiteboul and E. Shamir, eds., Proc. 21st Internat. Colloq. on Automata, Languages and Programming (ICALP '94), Springer, Berlin
    • C. Blundo, A. De Santis, and U. Vaccaro, Randomness in distribution protocols, in: S. Abiteboul and E. Shamir, eds., Proc. 21st Internat. Colloq. on Automata, Languages and Programming (ICALP '94), Lecture Notes in Computer Science, Vol. 820 (Springer, Berlin, 1994) 568-579.
    • (1994) Lecture Notes in Computer Science , vol.820 , pp. 568-579
    • Blundo, C.1    De Santis, A.2    Vaccaro, A.U.3
  • 15
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E.F. Brickell and D.M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptology 4 (1991) 123-124.
    • (1991) J. Cryptology , vol.4 , pp. 123-124
    • Brickell, E.F.1    Davenport, D.M.2
  • 16
    • 0005167951 scopus 로고
    • The detection of cheaters in threshold schemes
    • E.F. Brickell and D.R. Stinson, The detection of cheaters in threshold schemes, SIAM J. Discrete Math. 4 (1991) 502-510.
    • (1991) SIAM J. Discrete Math. , vol.4 , pp. 502-510
    • Brickell, E.F.1    Stinson, D.R.2
  • 17
    • 0026992660 scopus 로고
    • Some improved bounds on the information rate of perfect secret sharing schemes
    • E.F. Brickell and D.R. Stinson, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology 5 (1992) 153-166.
    • (1992) J. Cryptology , vol.5 , pp. 153-166
    • Brickell, E.F.1    Stinson, D.R.2
  • 19
    • 85028775273 scopus 로고
    • Size of shares and probability of cheating in threshold schemes
    • T. Helleseth, ed., Advances in Cryptology - EUROCRYPT '93, Springer, Berlin
    • M. Carpentieri, A. De Santis and U. Vaccaro, Size of shares and probability of cheating in threshold schemes, in: T. Helleseth, ed., Advances in Cryptology - EUROCRYPT '93, Lecture Notes in Computer Science, Vol. 765 (Springer, Berlin, 1994) 118-125.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 118-125
    • Carpentieri, M.1    De Santis, A.2    Vaccaro, U.3
  • 20
    • 84948972864 scopus 로고
    • The size of a share must be large
    • to appear in: A. De Santis, ed., Advances in Cryptology - EUROCRYPT '94, Springer, Berlin
    • L. Csirmaz, The size of a share must be large, to appear in: A. De Santis, ed., Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, Vol. 950 (Springer, Berlin, 1995).
    • (1995) Lecture Notes in Computer Science , vol.950
    • Csirmaz, L.1
  • 24
  • 27
    • 84921169347 scopus 로고
    • A protocol to set up shared secret schemes without the assistance of a mutually trusted party
    • Advances in Cryptology - CRYPTO 90, Menezes and Vanstone eds., Springer, Berlin
    • I. Ingemarsson and G.J. Simmons, A protocol to set up shared secret schemes without the assistance of a mutually trusted party, in: Advances in Cryptology - CRYPTO 90, Menezes and Vanstone eds., Lecture Notes in Computer Science, Vol. 473 (Springer, Berlin, 1991) 266-282.
    • (1991) Lecture Notes in Computer Science , vol.473 , pp. 266-282
    • Ingemarsson, I.1    Simmons, G.J.2
  • 29
    • 84966614707 scopus 로고
    • Multisecret threshold schemes
    • D.R. Stinson, ed., Advances in Cryptology -CRYPTO '93, Springer, Berlin
    • W.-A. Jackson, K.M. Martin, and C.M. O'Keefe, Multisecret threshold schemes, in: D.R. Stinson, ed., Advances in Cryptology -CRYPTO '93, Lecture Notes in Computer Science, Vol. 773 (Springer, Berlin, 1994) 126-135.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 126-135
    • Jackson, W.-A.1    Martin, K.M.2    O'Keefe, C.M.3
  • 31
    • 0002918554 scopus 로고
    • The complexity of nonuniform random number generation
    • J.F. Traub, ed., Academic Press, New york
    • D.E. Knuth and A.C. Yao, The complexity of nonuniform random number generation, in: J.F. Traub, ed., Algorithms and Complexity (Academic Press, New york, 1976) 357-428.
    • (1976) Algorithms and Complexity , pp. 357-428
    • Knuth, D.E.1    Yao, A.C.2
  • 32
    • 85023433586 scopus 로고
    • Generalized linear threshold schemes
    • G.R. Blakley and D. Chaum, eds., Advances in Cryptology - CRYPTO 84, Springer Berlin
    • S.C. Kothari, Generalized linear threshold schemes, in: G.R. Blakley and D. Chaum, eds., Advances in Cryptology - CRYPTO 84, Lecture Notes in Computer Science, Vol 196 (Springer Berlin, 1985) 231-241.
    • (1985) Lecture Notes in Computer Science , vol.196 , pp. 231-241
    • Kothari, S.C.1
  • 33
    • 0019608784 scopus 로고
    • On sharing secrets and Reed-Solomon codes
    • R.J. McEliece and D.V. Sarwate, On sharing secrets and Reed-Solomon codes, Comm. ACM 24 (1981) 583-584.
    • (1981) Comm. ACM , vol.24 , pp. 583-584
    • McEliece, R.J.1    Sarwate, D.V.2
  • 36
    • 84887505836 scopus 로고    scopus 로고
    • Visual cryptography
    • to appear A. De Santis, ed., Advances in Cryptology - Eurocrypt '94, (Springer, Berlin)
    • M. Naor and A. Shamir, Visual cryptography, to appear in: A. De Santis, ed., Advances in Cryptology - Eurocrypt '94, Lecture Notes in Computer Science, Vol. 950 (Springer, Berlin).
    • Lecture Notes in Computer Science , vol.950
    • Naor, M.1    Shamir, A.2
  • 37
    • 0040590338 scopus 로고
    • Covering the edges of a graph by
    • L. Lovász, D. Miklós and T. Szönyi, eds., Colloquia Mathematica Soc., János Bolyai North-Holland, Amsterdam
    • L. Pyber, Covering the edges of a graph by..., in: L. Lovász, D. Miklós and T. Szönyi, eds., Sets, Graphs and Numbers, Colloquia Mathematica Soc., János Bolyai (North-Holland, Amsterdam, 1992) 583-610
    • (1992) Sets, Graphs and Numbers , pp. 583-610
    • Pyber, L.1
  • 38
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • T. Rabin and M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority, in: Proc. 21st ACM Symp. on Theory of Computing (1989) 73-85.
    • (1989) Proc. 21st ACM Symp. on Theory of Computing , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 39
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Comm. ACM 22 (11) (1979) 612-613.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 40
    • 0005180192 scopus 로고
    • Robust shared secret schemes or 'how to be sure you have the right answer even though you don't know the question'
    • G.J. Simmons, Robust shared secret schemes or 'how to be sure you have the right answer even though you don't know the question', Congr. Numer. 68 (1989) 215-248.
    • (1989) Congr. Numer. , vol.68 , pp. 215-248
    • Simmons, G.J.1
  • 41
    • 84898275803 scopus 로고
    • Prepositioned shared secret and/or shared control schemes
    • Proc. Advances in Cryptology - CRYPTO '89, Springer, Berlin
    • G.J. Simmons, Prepositioned shared secret and/or shared control schemes, in: Proc. Advances in Cryptology - CRYPTO '89, Lecture Notes in Computer Science, Vol. 434 (Springer, Berlin, 1990) 436-467.
    • (1990) Lecture Notes in Computer Science , vol.434 , pp. 436-467
    • Simmons, G.J.1
  • 43
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • D.R. Stinson, An explication of secret sharing schemes, Designs, Codes and Cryptography 2 (1992) 357-390.
    • (1992) Designs, Codes and Cryptography , vol.2 , pp. 357-390
    • Stinson, D.R.1
  • 44
    • 85028945826 scopus 로고
    • New general lower bounds on the information rate of secret sharing schemes
    • E. Brickell, ed., Proc. Advances in Cryptology - CRYPTO '92, Springer Berlin
    • D.R. Stinson, New general lower bounds on the information rate of secret sharing schemes, in: E. Brickell, ed., Proc. Advances in Cryptology - CRYPTO '92, Lecture Notes in Computer Science, Vol. 740, (Springer Berlin, 1993) 170-184.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 170-184
    • Stinson, D.R.1
  • 45
    • 0028323999 scopus 로고
    • Decomposition constructions for secret sharing schemes
    • D.R. Stinson, Decomposition constructions for secret sharing schemes, IEEE Trans. Inform. Theory 40 (1994) 118-125.
    • (1994) IEEE Trans. Inform. Theory , vol.40 , pp. 118-125
    • Stinson, D.R.1
  • 46
    • 0024141971 scopus 로고
    • How to share a secret with cheaters
    • M. Tompa and H. Woll, How to share a secret with cheaters, J. Cryptology 1 (1988) 133-138.
    • (1988) J. Cryptology , vol.1 , pp. 133-138
    • Tompa, M.1    Woll, H.2
  • 47
    • 51249184730 scopus 로고
    • Covering of graphs by complete bipartite subgraphs; complexity of 0-1 matrices
    • Z. Tuza, Covering of graphs by complete bipartite subgraphs; complexity of 0-1 matrices, Combinatorica 4 (1) (1984) 111-116.
    • (1984) Combinatorica , vol.4 , Issue.1 , pp. 111-116
    • Tuza, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.