메뉴 건너뛰기




Volumn 42, Issue 8, 1999, Pages 638-649

Bounds and techniques for efficient redistribution of secret shares to new access structures

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA STRUCTURES; DISTRIBUTED COMPUTER SYSTEMS; NETWORK PROTOCOLS; OPTIMIZATION; SECURITY OF DATA;

EID: 0033351734     PISSN: 00104620     EISSN: None     Source Type: Journal    
DOI: 10.1093/comjnl/42.8.638     Document Type: Article
Times cited : (39)

References (24)
  • 2
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A. (1979) How to share a secret. Commun. ACM, 22, 612-613.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 4
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • Stinson, D. R. (1992) An explication of secret sharing schemes. Des. Codes Cryptogr., 2, 357-390.
    • (1992) Des. Codes Cryptogr. , vol.2 , pp. 357-390
    • Stinson, D.R.1
  • 5
    • 84921169347 scopus 로고
    • A protocol to set up shared secret schemes without the assistance of a mutually trusted party
    • Springer-Verlag, Berlin
    • Ingemarsson, I. and Simmons. G. J. (1991) A protocol to set up shared secret schemes without the assistance of a mutually trusted party. In Adv. in Cryptology - EUROCRYPT'90 (Lect. Notes Comput. Sci., vol. 473), pp. 266-282. Springer-Verlag, Berlin.
    • (1991) Adv. in Cryptology - Eurocrypt'90 Lect. Notes Comput. Sci. , vol.473 , pp. 266-282
    • Ingemarsson, I.1    Simmons, G.J.2
  • 6
    • 0342890136 scopus 로고    scopus 로고
    • Mutually trusted authority free secret sharing schemes
    • Jackson, W.-A., Martin, K. M. and O'Keefe, C. M. (1997) Mutually trusted authority free secret sharing schemes. J. Cryptol, 10, 261-289.
    • (1997) J. Cryptol , vol.10 , pp. 261-289
    • Jackson, W.-A.1    Martin, K.M.2    O'Keefe, C.M.3
  • 7
    • 0000354685 scopus 로고
    • Some ideal secret sharing schemes
    • Brickell, E. F. (1989) Some ideal secret sharing schemes. J. Comb. Math. Comb. Comput., 9, 105-113.
    • (1989) J. Comb. Math. Comb. Comput. , vol.9 , pp. 105-113
    • Brickell, E.F.1
  • 9
    • 0001522694 scopus 로고
    • On the information rate of perfect secret sharing schemes
    • van Dijk, M. (1995) On the information rate of perfect secret sharing schemes. Des. Codes Cryptogr., 6, 143-169.
    • (1995) Des. Codes Cryptogr. , vol.6 , pp. 143-169
    • Van Dijk, M.1
  • 14
    • 0013546220 scopus 로고    scopus 로고
    • On the dealer's randomness required in secret sharing schemes
    • Blundo, C., Giorgia Gaggia, A. and Stinson, D. R. (1997) On the dealer's randomness required in secret sharing schemes. Des. Codes Cryptogr., 11, 235-259.
    • (1997) Des. Codes Cryptogr. , vol.11 , pp. 235-259
    • Blundo, C.1    Giorgia Gaggia, A.2    Stinson, D.R.3
  • 15
    • 85034837254 scopus 로고
    • Secret sharing homomorphisms: Keeping shares of a secret secret
    • Springer-Verlag, Berlin
    • Benaloh, J. (1987) Secret sharing homomorphisms: keeping shares of a secret secret. In Adv. in Cryptology - CRYPTO'86 (Lect. Notes Comput. Sci, vol. 263), pp. 251-260. Springer-Verlag, Berlin.
    • (1987) Adv. in Cryptology - CRYPTO'86 Lect. Notes Comput. Sci , vol.263 , pp. 251-260
    • Benaloh, J.1
  • 16
    • 0000527282 scopus 로고
    • Homomorphic zero-knowledge threshold schemes over any finite abelian group
    • Desmedt, Y. G. and Frankel, Y. (1994) Homomorphic zero-knowledge threshold schemes over any finite abelian group. SIAM J. Discrete Math., 4, 667-679.
    • (1994) SIAM J. Discrete Math. , vol.4 , pp. 667-679
    • Desmedt, Y.G.1    Frankel, Y.2
  • 18
    • 21944452447 scopus 로고    scopus 로고
    • Increasing efficiency of international key escrow in mutually mistrusting domains
    • Springer-Verlag, Berlin
    • Martin, K. M. (1997) Increasing efficiency of international key escrow in mutually mistrusting domains. In Cryptography and Coding (Lect. Notes Comput. Sci., vol. 1355), pp. 221-232. Springer-Verlag, Berlin.
    • (1997) Cryptography and Coding Lect. Notes Comput. Sci. , vol.1355 , pp. 221-232
    • Martin, K.M.1
  • 21
    • 0005269075 scopus 로고
    • Untrustworthy participants in secret sharing schemes
    • Oxford University Press, Oxford, UK
    • Martin, K. M. (1993) Untrustworthy participants in secret sharing schemes. Cryptography and Coding III, pp. 255-264. Oxford University Press, Oxford, UK.
    • (1993) Cryptography and Coding III , pp. 255-264
    • Martin, K.M.1
  • 23
    • 0006544582 scopus 로고    scopus 로고
    • A combinatorial interpretation of ramp schemes
    • Jackson, W.-A. and Martin, K. M. (1996) A combinatorial interpretation of ramp schemes. Australas. J. Comb., 14, 51-60.
    • (1996) Australas. J. Comb. , vol.14 , pp. 51-60
    • Jackson, W.-A.1    Martin, K.M.2
  • 24
    • 0033076984 scopus 로고    scopus 로고
    • An application of ramp schemes to broadcast encryption
    • Stinson, D. R. and Wei, R. (1999) An application of ramp schemes to broadcast encryption. Inf. Process. Lett., 69, 131-135.
    • (1999) Inf. Process. Lett. , vol.69 , pp. 131-135
    • Stinson, D.R.1    Wei, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.