메뉴 건너뛰기




Volumn 21, Issue 13, 1998, Pages 1170-1176

An on-line secret sharing scheme for multi-secrets

Author keywords

Cryptography; Information security; RSA cryptosystem; Secret sharing scheme; Shamir's (r,n) threshold scheme

Indexed keywords

CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; ONLINE SYSTEMS;

EID: 0032163101     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0140-3664(98)00191-1     Document Type: Article
Times cited : (68)

References (18)
  • 2
    • 85027202957 scopus 로고
    • Generalized secret sharing and monotone functions
    • Springer-Verlag, Berlin
    • J. Benaloh, J. Leichter, Generalized secret sharing and monotone functions, in: Advances in Cryptology-Crypto '88, Springer-Verlag, Berlin, 1990, pp. 27-35.
    • (1990) Advances in Cryptology-Crypto '88 , pp. 27-35
    • Benaloh, J.1    Leichter, J.2
  • 3
    • 0001318089 scopus 로고
    • Safeguarding cryptographic keys
    • American Federation of Information Processing Societies
    • G.R. Blakley, Safeguarding cryptographic keys, Proceedings of the National Computer Conference, American Federation of Information Processing Societies 48 (1979) 242-268.
    • (1979) Proceedings of the National Computer Conference , vol.48 , pp. 242-268
    • Blakley, G.R.1
  • 7
    • 3142632495 scopus 로고
    • On-line secret sharing
    • Springer-Verlag, Berlin
    • C. Cachin, On-line secret sharing, in: Cryptography and Coding, Springer-Verlag, Berlin, 1994, pp. 190-198.
    • (1994) Cryptography and Coding , pp. 190-198
    • Cachin, C.1
  • 9
    • 0345487722 scopus 로고
    • A cascade exponentiation evaluation scheme based on the Lempel-Ziv-Welch compression algorithm
    • C.C. Chang, H.J. Horug, D.J. Buehrer, A cascade exponentiation evaluation scheme based on the Lempel-Ziv-Welch compression algorithm, Journal of Information Science and Engineering 11 (3) (1995) 417-431.
    • (1995) Journal of Information Science and Engineering , vol.11 , Issue.3 , pp. 417-431
    • Chang, C.C.1    Horug, H.J.2    Buehrer, D.J.3
  • 10
    • 84948972864 scopus 로고
    • The size of a share must be Large
    • Springer-Verlag, Berlin
    • L. Csirmaz, The size of a share must be Large, in: Advances in Cryptology Eurocrypt '94, Springer-Verlag, Berlin, 1995, pp. 13-22.
    • (1995) Advances in Cryptology Eurocrypt '94 , pp. 13-22
    • Csirmaz, L.1
  • 12
    • 0003946096 scopus 로고
    • Secret sharing made short
    • Springer-Verlag, Berlin
    • H. Krawczyk, Secret sharing made short, in: Advances in Cryptology-Crypto '93, Springer-Verlag, Berlin, 1994, pp. 113-138.
    • (1994) Advances in Cryptology-Crypto '93 , pp. 113-138
    • Krawczyk, H.1
  • 13
    • 0030572225 scopus 로고    scopus 로고
    • On-line multiple secret sharing
    • R.G.E. Pinch, On-line multiple secret sharing, Electronics Letters 32 (1996) 1087-1088.
    • (1996) Electronics Letters , vol.32 , pp. 1087-1088
    • Pinch, R.G.E.1
  • 14
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Communication of ACM 22 (1979) 612-613.
    • (1979) Communication of ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystem
    • R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public key cryptosystem, Communication of ACM 21 (1978) 120-126.
    • (1978) Communication of ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.