메뉴 건너뛰기




Volumn 32, Issue 12, 1996, Pages 1087-1088

Online multiple secret sharing

Author keywords

Information theory; Security of data

Indexed keywords

CALCULATIONS; FUNCTIONS; INFORMATION THEORY; ONLINE SYSTEMS; RANDOM PROCESSES; SECURITY OF DATA; SET THEORY;

EID: 0030572225     PISSN: 00135194     EISSN: None     Source Type: Journal    
DOI: 10.1049/el:19960692     Document Type: Article
Times cited : (27)

References (11)
  • 1
    • 84947912228 scopus 로고
    • On-line secret sharing
    • BOYD, C. (Ed.): 'Cryptography and coding'
    • CACHIN, C: 'On-line secret sharing', in BOYD, C. (Ed.): 'Cryptography and coding'. Lect. Notes Comput. Sci., 1025 1994, pp. 190-198
    • (1994) Lect. Notes Comput. Sci. , vol.1025 , pp. 190-198
    • Cachin, C.1
  • 3
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • LAMPORT, L.: 'Password authentication with insecure communication', Commun. ACM., 1981, 24, pp. 770-772
    • (1981) Commun. ACM. , vol.24 , pp. 770-772
    • Lamport, L.1
  • 4
    • 84947597805 scopus 로고
    • Towards the equivalence of breaking the Diffie-Hellman protocol and discrete logarithms
    • DESMEDT, Y.G. (Ed.): 'Advances in cryptography - Crypto '94'
    • MAURER, U.M.: 'Towards the equivalence of breaking the Diffie-Hellman protocol and discrete logarithms', in DESMEDT, Y.G. (Ed.): 'Advances in cryptography - Crypto '94'. Lect. Notes Comput. Sci., 839, 1994, pp.271-281
    • (1994) Lect. Notes Comput. Sci. , vol.839 , pp. 271-281
    • Maurer, U.M.1
  • 5
    • 0017018484 scopus 로고
    • New directions in cryptography
    • DIFFIE, W., and HELLMAN, M.E.: 'New directions in cryptography', IEEE Trans. Inf. Theory, 1976, IT-22, pp. 644-654
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 6
    • 84864708144 scopus 로고
    • Multiparty computations ensuring privacy of each party's input and correctness of the result
    • POMERANCE, C. (Ed.): 'Advances in cryptography - Crypto '87'
    • CHAUM, D., DAMGÅRD, I.B., and VAN DE GRAAF, J.: 'Multiparty computations ensuring privacy of each party's input and correctness of the result', in POMERANCE, C. (Ed.): 'Advances in cryptography - Crypto '87', Lect. Notes Comput. Sci., 297, 1988, pp.87-119
    • (1988) Lect. Notes Comput. Sci. , vol.297 , pp. 87-119
    • Chaum, D.1    Damgård, I.B.2    Van De Graaf, J.3
  • 7
    • 0025056443 scopus 로고
    • A discrete logarithm implementation of perfect zero-knowledge blobs
    • BOSAR, J.F., KURTZ, S.A., and KRENTEL, M.W.: 'A discrete logarithm implementation of perfect zero-knowledge blobs', J. Cryptol., 1990, 2, pp. 63-76
    • (1990) J. Cryptol. , vol.2 , pp. 63-76
    • Bosar, J.F.1    Kurtz, S.A.2    Krentel, M.W.3
  • 10
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • WILLIAMS. H.C.: 'Advances in cryptology - Crypto '85'
    • MILLER, V.S.: 'Use of elliptic curves in cryptography', in WILLIAMS. H.C.: 'Advances in cryptology - Crypto '85'. Lect. Notes Comput. Sci., 218, 1986, pp.417-426
    • (1986) Lect. Notes Comput. Sci. , vol.218 , pp. 417-426
    • Miller, V.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.