메뉴 건너뛰기




Volumn 46, Issue 1, 1999, Pages 7-11

Concept of designing cheater identification methods for secret sharing

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER SYSTEMS PROGRAMMING; PATTERN RECOGNITION; SECURITY OF DATA;

EID: 0033115859     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0164-1212(98)10084-5     Document Type: Article
Times cited : (21)

References (25)
  • 2
    • 0025700831 scopus 로고
    • Improved digital signature scheme based on discrete exponentiation
    • Agnew G.B., Mallin R.C., Vanatone J. Improved digital signature scheme based on discrete exponentiation. Electronics Letters. 26(14):1990;1024-1025.
    • (1990) Electronics Letters , vol.26 , Issue.14 , pp. 1024-1025
    • Agnew, G.B.1    Mallin, R.C.2    Vanatone, J.3
  • 4
    • 85027202957 scopus 로고
    • Generalized secret sharing and monotone functions
    • Springer, Heidelberg
    • Benaloh, J., Leichter, J. 1990. Generalized secret sharing and monotone functions. Advances in Cryptology-Crypto '88, Springer, Heidelberg, 27-35.
    • (1990) Advances in Cryptology-Crypto '88 , pp. 27-35
    • Benaloh, J.1    Leichter, J.2
  • 5
    • 0001318089 scopus 로고
    • Safeguarding Cryptographic Keys, Proceedings of the National Computer Conference
    • Blakley G.R. Safeguarding Cryptographic Keys, Proceedings of the National Computer Conference. American Federation of Information Processing Societies. 48:1979;242-268.
    • (1979) American Federation of Information Processing Societies , vol.48 , pp. 242-268
    • Blakley, G.R.1
  • 7
    • 84955577744 scopus 로고
    • The detection of cheaters in threshold schemes
    • Springer, Heidelberg
    • Brickell E.F., Stinton, D.R., 1990. The detection of cheaters in threshold schemes. Advances in Cryptology-Crypto '88, Springer, Heidelberg, 564-577.
    • (1990) Advances in Cryptology-Crypto '88 , pp. 564-577
    • Brickell, E.F.1    Stinton, D.R.2
  • 8
    • 85031623990 scopus 로고
    • Digital Signature Standard, National Bureau of Standards FIPS Publication 186
    • Digital Signature Standard, National Bureau of Standards FIPS Publication 186, 1994.
    • (1994)
  • 9
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • ElGamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory. IT-31:1985;469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 10
    • 0028762624 scopus 로고
    • New Digital Signature Scheme Based on Discrete Logarithm
    • Harn L. New Digital Signature Scheme Based on Discrete Logarithm. Electronics Letters. 30(5):1994;396-398.
    • (1994) Electronics Letters , vol.30 , Issue.5 , pp. 396-398
    • Harn, L.1
  • 11
    • 0028547435 scopus 로고
    • Design of Generaliszed ElGamal Type Digital Signature Scheme Based on Discrete Logarithm
    • Harn L., Xu Y. Design of Generaliszed ElGamal Type Digital Signature Scheme Based on Discrete Logarithm. Electronics Letters. 30(24):1994;2025-2026.
    • (1994) Electronics Letters , vol.30 , Issue.24 , pp. 2025-2026
    • Harn, L.1    Xu, Y.2
  • 13
  • 16
    • 0345121672 scopus 로고
    • Generalized threshold cryptosystems
    • Springer, Heidelberg
    • Laih, C.H., Harn, L., 1991. Generalized threshold cryptosystems. Advances in Cryptology-Asiacrypt '91, Springer, Heidelberg, 159-166.
    • (1991) Advances in Cryptology-Asiacrypt '91 , pp. 159-166
    • Laih, C.H.1    Harn, L.2
  • 17
    • 0029375592 scopus 로고
    • Authenticated Encryption Scheme without Using a One Way Function
    • Lee W.B., Chang C.C. Authenticated Encryption Scheme without Using a One Way Function. Electronics Letters. 31(19):1995;1656-1657.
    • (1995) Electronics Letters , vol.31 , Issue.19 , pp. 1656-1657
    • Lee, W.B.1    Chang, C.C.2
  • 18
    • 0344259195 scopus 로고
    • A generalized secret sharing scheme with cheater detection
    • Springer, Heidelberg
    • Lin, H.Y., Harn, L., 1991. A generalized secret sharing scheme with cheater detection. Advances in Cryptology-Asiacrypt '91, Springer, Heidelberg, 149-158.
    • (1991) Advances in Cryptology-Asiacrypt '91 , pp. 149-158
    • Lin, H.Y.1    Harn, L.2
  • 20
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-key Cryptosystems
    • Rivest R.L., Shamir A., Adleman L. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM. 21(2):1978;120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 21
    • 85031621545 scopus 로고
    • Secure Hash Standard, National Bureau of Standards FIPS Publication 180
    • Secure Hash Standard, National Bureau of Standards FIPS Publication 180, 1993.
    • (1993)
  • 22
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Shamir A. How to Share a Secret. Communications of the ACM. 22(11):1974;612-613.
    • (1974) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 23
    • 0024141971 scopus 로고
    • How to Share a Secret with Cheaters
    • Tompa M., Woll H. How to Share a Secret with Cheaters. Journal of Cryptology. 1(2):1988;133-138.
    • (1988) Journal of Cryptology , vol.1 , Issue.2 , pp. 133-138
    • Tompa, M.1    Woll, H.2
  • 24
    • 0029369348 scopus 로고
    • Cheating Detection and Cheater Identification in Secret Sharing Schemes
    • Wu T.C., Wu T.S. Cheating Detection and Cheater Identification in Secret Sharing Schemes. IEE Proceedings-Computers and Digital Techniques. 142(5):1995;367-369.
    • (1995) IEE Proceedings-Computers and Digital Techniques , vol.142 , Issue.5 , pp. 367-369
    • Wu, T.C.1    Wu, T.S.2
  • 25
    • 84935531957 scopus 로고
    • Relationship Between MDS Codes and Threshold Scheme
    • Xain Y Y. Relationship Between MDS Codes and Threshold Scheme. Electronics Letters. 24(3):1988;154-156.
    • (1988) Electronics Letters , vol.24 , Issue.3 , pp. 154-156
    • Xain, Y.Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.