메뉴 건너뛰기




Volumn 144, Issue 1, 1997, Pages 23-27

Efficient cheater identification method for threshold schemes

Author keywords

Cheater identification; Cheating detection; Chinese remainder theorem; Quadratic residues; Share secret; Threshold scheme

Indexed keywords

CALCULATIONS; COMPUTATION THEORY; CRYPTOGRAPHY; SECURITY OF DATA; THRESHOLD ELEMENTS;

EID: 0030676509     PISSN: 13502387     EISSN: None     Source Type: Journal    
DOI: 10.1049/ip-cdt:19970821     Document Type: Article
Times cited : (37)

References (17)
  • 2
    • 0001318089 scopus 로고
    • Safeguarding cryptographic keys
    • American Federation of Information Processing Societies
    • BLAKLEY, G.R.: 'Safeguarding cryptographic keys'. Proceedings of the national computer conference, 1979, American Federation of Information Processing Societies, 1979, Vol. 48, pp. 242-268
    • (1979) Proceedings of the National Computer Conference, 1979 , vol.48 , pp. 242-268
    • Blakley, G.R.1
  • 3
    • 0010475265 scopus 로고
    • The detection of cheaters in threshold schemes
    • Springer-Verlag, Berlin, Heidelberg
    • BRICKELL, E.F., and STINTON, D.R.: The detection of cheaters in threshold schemes' in 'Advances in cryptology- Crypto '88' (Springer-Verlag, Berlin, Heidelberg, 1988), pp. 2017-2018
    • (1988) Advances in Cryptology- Crypto '88' , pp. 2017-2018
    • Brickell, E.F.1    Stinton, D.R.2
  • 4
    • 0028549976 scopus 로고
    • Iterative modular multiplication algorithm without magnitude comparison
    • CHIOU, C.W., and YANG, T.C.: 'Iterative modular multiplication algorithm without magnitude comparison', Electron. Lett., 1994, 30, (24), pp. 2017-2018
    • (1994) Electron. Lett. , vol.30 , Issue.24 , pp. 2017-2018
    • Chiou, C.W.1    Yang, T.C.2
  • 6
    • 0019573099 scopus 로고
    • A database encryption system with subkeys
    • DAVIDA, G.I., WELLS, D.L., and KAM, J.B.: 'A database encryption system with subkeys', ACM Trans. Database Syst., 1981, 6, (2), pp. 312-328
    • (1981) ACM Trans. Database Syst. , vol.6 , Issue.2 , pp. 312-328
    • Davida, G.I.1    Wells, D.L.2    Kam, J.B.3
  • 10
    • 0345121671 scopus 로고
    • Digitized signatures and public-key functions as intractable as factorization
    • MIT Laboratory for Computer Science, Cambridge, MA
    • RABIN, M.O.: 'Digitized signatures and public-key functions as intractable as factorization'. Technical report LCS/TR-212, MIT Laboratory for Computer Science, Cambridge, MA, 1979
    • (1979) Technical Report LCS/TR-212
    • Rabin, M.O.1
  • 11
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • RIVEST, R.L., SHAMIR, A., and ADLEMAN, L.: 'A method for obtaining digital signatures and public key cryptosystems', Commun. ACM, 1978, 21, (2), pp. 120-126
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 12
    • 0018545449 scopus 로고
    • How to share a secret
    • SHAMIR, A.: 'How to share a secret', Commun. ACM, 1979, 22, (11), pp. 612-613
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 15
    • 0028548565 scopus 로고
    • Construction of dynamic threshold schemes
    • SUN, H.M., and SHIEH, S.P.: 'Construction of dynamic threshold schemes', Electron. Lett., 1994, 30, (24), pp. 2023-2024
    • (1994) Electron. Lett. , vol.30 , Issue.24 , pp. 2023-2024
    • Sun, H.M.1    Shieh, S.P.2
  • 16
    • 0024141971 scopus 로고
    • How to share a secret with cheaters
    • TOMPA, M., and WOLL, H.: 'How to share a secret with cheaters', J. Cryptol., 1988, 1, pp. 133-138
    • (1988) J. Cryptol. , vol.1 , pp. 133-138
    • Tompa, M.1    Woll, H.2
  • 17
    • 0029369348 scopus 로고
    • Cheating detection and cheater identification in secret sharing schemes
    • WU, T.C., and WU, T.S.: 'Cheating detection and cheater identification in secret sharing schemes', IEE Proc. E, Comput. Digit. Tech. (UK), 1995, 142, (5), pp. 367-369
    • (1995) IEE Proc. E, Comput. Digit. Tech. (UK) , vol.142 , Issue.5 , pp. 367-369
    • Wu, T.C.1    Wu, T.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.