-
1
-
-
0018545449
-
"How to share a secret,"
-
A. Shamir, "How to share a secret," Commun. ACM, vol.22, no.3, pp.612-613, 1979.
-
Commun. ACM, Vol.22, No.3, Pp.612-613, 1979.
-
-
Shamir, A.1
-
2
-
-
85062838317
-
"Safeguarding cryptographic keys,"
-
G.R. Blakley, "Safeguarding cryptographic keys," AFIPS 1979 Natl. Comput. Conf., vol.48, pp.313-317, New York, 1979.
-
AFIPS 1979 Natl. Comput. Conf., Vol.48, Pp.313-317, New York, 1979.
-
-
Blakley, G.R.1
-
3
-
-
0028498073
-
"Multistage secret sharing based on one-way function,"
-
J. He and E. Dawson, "Multistage secret sharing based on one-way function," Electron. Lett., vol.30, no.19, pp.15911592, 1994.
-
Electron. Lett., Vol.30, No.19, Pp.15911592, 1994.
-
-
He, J.1
Dawson, E.2
-
4
-
-
84886634682
-
''Comment: Multistage secret sharing based on one-way function,"
-
L. Harn, ''Comment: Multistage secret sharing based on one-way function," Electron. Lett., vol.31, no.4, p.262, 1995.
-
Electron. Lett., Vol.31, No.4, P.262, 1995.
-
-
Harn, L.1
-
5
-
-
0029197220
-
''Multi-secret sharing scheme based on one-way function,"
-
J. He and E. Dawson, ''Multi-secret sharing scheme based on one-way function," Electron. Lett., vol.31, no.2, pp.9394, 1995.
-
Electron. Lett., Vol.31, No.2, Pp.9394, 1995.
-
-
He, J.1
Dawson, E.2
-
6
-
-
0029305471
-
''Efficient sharing (broadcasting) of multiple secrets,"
-
L. Harn, ''Efficient sharing (broadcasting) of multiple secrets," Proc. IEE-Cornpiit. Digit. Tech., vol.142, no.3, pp.237-240, May 1995.
-
Proc. IEE-Cornpiit. Digit. Tech., Vol.142, No.3, Pp.237-240, May 1995.
-
-
Harn, L.1
-
7
-
-
85027113732
-
"The digital signature standard proposed by NIST,"
-
"The digital signature standard proposed by NIST," Commun. ACM, vol.35, no.7, pp.3G-40, 1992.
-
Commun. ACM, Vol.35, No.7, Pp.3G-40, 1992.
-
-
-
8
-
-
85027144823
-
And D.J. Costello, Jr
-
S. Lin and D.J. Costello, Jr., Error Control Coding: Fundamentals and Applications, Prentice-Hall, Englewood Cliffs, NJ, 1983.
-
Error Control Coding: Fundamentals and Applications, Prentice-Hall, Englewood Cliffs, NJ, 1983.
-
-
Lin S1
-
9
-
-
0029535977
-
L. Gong, A.A. Lazar, and W. Guo, "Authenticated key distribution and secure broadcast using no conventional encryption: A unified approach based on block codes,'"
-
R.H. Dcng, L. Gong, A.A. Lazar, and W. Guo, "Authenticated key distribution and secure broadcast using no conventional encryption: A unified approach based on block codes,'" IEEE GLOBECOM'95, pp.1193-1197, 1995.
-
IEEE GLOBECOM'95, Pp.1193-1197, 1995.
-
-
Dcng, R.H.1
-
10
-
-
0025558124
-
C.-L. I, R.D. Citlin, and J.E. Mazo, "Diversity coding: Using error control for self-healing in communication networks,"
-
E. Ayanoglu, C.-L. I, R.D. Citlin, and J.E. Mazo, "Diversity coding: Using error control for self-healing in communication networks," Proc. IEEE Inforin'90, pp.93-104, San Francisco, CA, June 5-7, 1990.
-
Proc. IEEE Inforin'90, Pp.93-104, San Francisco, CA, June 5-7, 1990.
-
-
Ayanoglu, E.1
-
11
-
-
0032623828
-
H.-W. Zhu, and S.J. Gu, "Cheater identification in (t, n) threshold scheme,"
-
K.J. Tan, H.-W. Zhu, and S.J. Gu, "Cheater identification in (t, n) threshold scheme," Computer Communications 22, pp.702-705, 1999.
-
Computer Communications 22, Pp.702-705, 1999.
-
-
Tan, K.J.1
-
12
-
-
84874800178
-
"A public-key cryptosystem and a signature scheme based on discrete logarithm,"
-
T. Elgamal, "A public-key cryptosystem and a signature scheme based on discrete logarithm," IEEE Trans. Inf. Theory, vol.IT-31, pp.409-472, July 1985.
-
IEEE Trans. Inf. Theory, Vol.IT-31, Pp.409-472, July 1985.
-
-
Elgamal, T.1
-
13
-
-
85027123825
-
''New protocols for third-party-bnsed authentication and secure broadcast,"
-
Fairfax, Virgina, Nov. 1994.
-
L. Gong, ''New protocols for third-party-bnsed authentication and secure broadcast," Proc. 2nd ACM Conference on Computer and Communications Security, pp.l7G-183, Fairfax, Virgina, Nov. 1994.
-
Proc. 2nd ACM Conference on Computer and Communications Security, Pp.l7G-183
-
-
Gong, L.1
-
14
-
-
0029369348
-
''Cheating detection and cheater identification in secret sharing schemes,"
-
T.C. \Vu and T.S. Wu, ''Cheating detection and cheater identification in secret sharing schemes," IEE Proc. Coinput. Digit. Tech., vol.142, pp.3G7-3u9, 1995.
-
IEE Proc. Coinput. Digit. Tech., Vol.142, Pp.3G7-3u9, 1995.
-
-
Wu, T.S.1
-
15
-
-
0030676509
-
"Efficient cheater identification method for threshold schemes,"
-
C.C. Chang and R.J. Hwang, "Efficient cheater identification method for threshold schemes," IEE Proc. Comput. Digit. Tech., vol.144, no.l, pp.23-27, 1990.
-
IEE Proc. Comput. Digit. Tech., Vol.144, No.l, Pp.23-27, 1990.
-
-
Chang, C.C.1
Hwang, R.J.2
-
16
-
-
0033115859
-
W.B. Lee, and C.C. Chang, "A concept of designing cheater identification methods for secret sharing,"
-
R.J. Ihvang, W.B. Lee, and C.C. Chang, "A concept of designing cheater identification methods for secret sharing," The Journal of Systems and Software 4G, pp.7-11, 1999.
-
The Journal of Systems and Software 4G, Pp.7-11, 1999.
-
-
Ihvang, R.J.1
-
18
-
-
0030195519
-
C.C. Chang, and YV.P. Yang, "An efficient dynamic threshold scheme,''
-
S.J. Ihvang, C.C. Chang, and YV.P. Yang, "An efficient dynamic threshold scheme,'' IEICE Trans. Inf. & Syst., vol.E79-D, no.7, pp.936-041, July 199G.
-
IEICE Trans. Inf. & Syst., Vol.E79-D, No.7, Pp.936-041, July 199G.
-
-
Ihvang, S.J.1
-
19
-
-
85027168569
-
K.M. Martin, and C.M. O'Kecfe, "On sharing many secrets,"
-
W.-A. Jackson, K.M. Martin, and C.M. O'Kecfe, "On sharing many secrets," Asiacrypt'94, pp.42-54, 1994.
-
Asiacrypt'94, Pp.42-54, 1994.
-
-
Jackson, W.-A.1
-
21
-
-
0020543282
-
J.W. Grecnc, and M.E. HcIIman, "On secret sharing systems,"
-
E.D. Karnin, J.W. Grecnc, and M.E. HcIIman, "On secret sharing systems," IEEE Trans. Inf. Theory, vol.IT-29, pp.35-41, Jan. 1983.
-
IEEE Trans. Inf. Theory, Vol.IT-29, Pp.35-41, Jan. 1983.
-
-
Karnin, E.D.1
-
22
-
-
85027188079
-
"A construction of practical secret sharing schemes using linear block codes,"
-
M. Bertilsson and I. Ingcmarsson, "A construction of practical secret sharing schemes using linear block codes," Auscrypt'92, pp.2-21, 1992.
-
Auscrypt'92, Pp.2-21, 1992.
-
-
Bertilsson, M.1
Ingcmarsson, I.2
-
23
-
-
85027116478
-
J.K. Jan, and Y.M. Tseng, "On the Generalized Threshold-Based Secret Sharing Schemes,"
-
H.-Y. Chien, J.K. Jan, and Y.M. Tseng, "On the Generalized Threshold-Based Secret Sharing Schemes," 10th National Security Conference, HwaLan Taiwan, May 2000.
-
10th National Security Conference, HwaLan Taiwan, May 2000.
-
-
Chien, H.-Y.1
-
25
-
-
85027163495
-
L. Gong, and T.M.A. Lomas, "Secure, keyed, and collisionful hash functions,"
-
SRI International, Menlo Park, California, May 1994.
-
T.A. Berson, L. Gong, and T.M.A. Lomas, "Secure, keyed, and collisionful hash functions," Technical Report SRICSL-94-08, Computer Science Laboratory, SRI International, Menlo Park, California, May 1994.
-
Technical Report SRICSL-94-08, Computer Science Laboratory
-
-
Berson, T.A.1
|