메뉴 건너뛰기




Volumn 25, Issue 6, 2002, Pages 723-733

A unified approach to secret sharing schemes with low distribution cost

Author keywords

Cryptography; Secret sharing

Indexed keywords

BLOCK CODES; COST EFFECTIVENESS; DATA PROCESSING; INFORMATION MANAGEMENT; INFORMATION RETRIEVAL SYSTEMS; SECURITY OF DATA;

EID: 0036853884     PISSN: 02533839     EISSN: 21587299     Source Type: Journal    
DOI: 10.1080/02533839.2002.9670746     Document Type: Article
Times cited : (10)

References (43)
  • 2
    • 0001318089 scopus 로고    scopus 로고
    • Proceedings of the National Computer Conference, New York.: American Federation of Information Processing Societies
    • Blakley, G.R., “Safeguarding Cryptographic Keys,”. Proceedings of the National Computer Conference. New York. Vol. 48, pp. 313–317. American Federation of Information Processing Societies.
    • Safeguarding Cryptographic Keys , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 3
    • 85027202957 scopus 로고
    • Generalized Secret Sharing and Monotone Functions
    • Springer-Verlag
    • Benaloh, J., and Leichter, J., 1990. “Generalized Secret Sharing and Monotone Functions,”. In Advances in Cryptology-EuroCrypt'90, 27–35. Springer-Verlag.
    • (1990) Advances in Cryptology-EuroCrypt'90 , pp. 27-35
    • Benaloh, J.1    Leichter, J.2
  • 4
    • 1842758400 scopus 로고
    • A Construction of Practical Secret Sharing Schemes Using Linear Block Codes
    • Springer-Verlag
    • Bertilsson, M., and Ingemarsson, I., 1992. “A Construction of Practical Secret Sharing Schemes Using Linear Block Codes,”. In Advances in Cryptology-Auscrypt'92, 2–21. Springer-Verlag.
    • (1992) Advances in Cryptology-Auscrypt'92 , pp. 2-21
    • Bertilsson, M.1    Ingemarsson, I.2
  • 5
    • 0027614601 scopus 로고
    • A New Generalized Group-oriented Cryptoscheme without Trusted Center
    • Chang, C.C., and Lee, H.C., 1993. “A New Generalized Group-oriented Cryptoscheme without Trusted Center,”. IEEE Journal on Selected Areas in Communications, 11 (5):725–729.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5 , pp. 725-729
    • Chang, C.C.1    Lee, H.C.2
  • 6
    • 0030676509 scopus 로고    scopus 로고
    • Efficient Cheater Identification Method for Threshold Schemes
    • Chang, C.C., and Hwang, R. J., 1996. “Efficient Cheater Identification Method for Threshold Schemes,”. IEE Proceedings- Computers and Digital Techniques, 144 (1):23–27.
    • (1996) IEE Proceedings- Computers and Digital Techniques , vol.144 , Issue.1 , pp. 23-27
    • Chang, C.C.1    Hwang, R.J.2
  • 11
    • 84874800178 scopus 로고
    • A Public-Key Cryptosystem and A Signature Scheme Based on Discrete Logarithm
    • Elgamal, T., 1985. “A Public-Key Cryptosystem and A Signature Scheme Based on Discrete Logarithm,”. IEEE Transactions on Information Theory, 31:469–472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 12
  • 13
    • 0028498073 scopus 로고
    • Multistage Secret Sharing Based on One-Way Function
    • He, J., and Dawson, E., 1994. “Multistage Secret Sharing Based on One-Way Function,”. Electronics Letters, 30 (19):1591–1592.
    • (1994) Electronics Letters , vol.30 , Issue.19 , pp. 1591-1592
    • He, J.1    Dawson, E.2
  • 14
    • 84886634682 scopus 로고
    • Comment: Multistage Secret Sharing Based on One-Way Function
    • Harn, L., 1995a. “Comment:Multistage Secret Sharing Based on One-Way Function,”. Electronics Letters, 31 (4):262
    • (1995) Electronics Letters , vol.31 , Issue.4 , pp. 262
    • Harn, L.1
  • 15
    • 0029197220 scopus 로고
    • Multi-Secret Sharing Scheme Based on One-Way Function
    • He, J., and Dawson, E., 1995. “Multi-Secret Sharing Scheme Based on One-Way Function,”. Electronics Letters, 31 (2):93–94.
    • (1995) Electronics Letters , vol.31 , Issue.2 , pp. 93-94
    • He, J.1    Dawson, E.2
  • 16
    • 0029305471 scopus 로고
    • Efficient Sharing (Broadcasting) of Multiple Secrets
    • Harn, L., 1995b. “Efficient Sharing (Broadcasting) of Multiple Secrets,”. IEE Proceedings-Computers and Digital Techniques, 142 (3):237–240.
    • (1995) IEE Proceedings-Computers and Digital Techniques , vol.142 , Issue.3 , pp. 237-240
    • Harn, L.1
  • 18
    • 0033115859 scopus 로고    scopus 로고
    • A Concept of Designing Cheater Identification Methods for Secret Sharing
    • Hwang, R.J., Lee, W.B., and Chang, C.C., 1999. “A Concept of Designing Cheater Identification Methods for Secret Sharing,”. The Journal of Systems and Software, 46:7–11.
    • (1999) The Journal of Systems and Software , vol.46 , pp. 7-11
    • Hwang, R.J.1    Lee, W.B.2    Chang, C.C.3
  • 22
    • 85023433586 scopus 로고
    • Generalized Linear ThreshOld Schemes
    • Springer-Verlag
    • Kothari, S.C., 1984. “Generalized Linear ThreshOld Schemes,”. In Advances in Cryptology-Crypto'84, LNCS 196, 231–241. Springer-Verlag.
    • (1984) Advances in Cryptology-Crypto'84, LNCS 196 , pp. 231-241
    • Kothari, S.C.1
  • 24
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • Lamport, L., 1981. “Password Authentication with Insecure Communication,”. Communications of the ACM, 24 (11):770–772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 25
    • 33749312824 scopus 로고
    • Dynamic Threshold Scheme Based on the Definition of Cross-product in an N-dimensional Linear Space
    • Springer-Verlag
    • Laih, C.S., Harn, L., Lee, J.Y., and Hwang, T.L., 1991. “Dynamic Threshold Scheme Based on the Definition of Cross-product in an N-dimensional Linear Space,”. In Advances in Cryptology-CRYPTO'89, Lecture Notes in Computer Science, No. 435 286–298. Springer-Verlag.
    • (1991) Advances in Cryptology-CRYPTO'89 , pp. 286-298
    • Laih, C.S.1    Harn, L.2    Lee, J.Y.3    Hwang, T.L.4
  • 26
    • 0344259195 scopus 로고
    • A Generalized Secret Sharing Scheme with Cheater Detection
    • Springer-Verlag
    • Lin, H.Y., and Harn, L., 1991. “A Generalized Secret Sharing Scheme with Cheater Detection,”. In Advances in Cryptology-AsiaCrypt'91, 83–87. Springer-Verlag.
    • (1991) Advances in Cryptology-AsiaCrypt'91 , pp. 83-87
    • Lin, H.Y.1    Harn, L.2
  • 27
    • 0345121672 scopus 로고
    • Generalized Threshold Cryptosystems
    • Springer-Verlag
    • Laih, C.S., and Harn, L., 1991. “Generalized Threshold Cryptosystems,”. In Advances in Cryptology-AsiaCrypt'91, 88–92. Springer-Verlag.
    • (1991) Advances in Cryptology-AsiaCrypt'91 , pp. 88-92
    • Laih, C.S.1    Harn, L.2
  • 29
    • 84936033986 scopus 로고
    • The Digital Signature Standard by NIST
    • NIST. 1992. “The Digital Signature Standard by NIST,”. Communications of the ACM, 35 (7):36–40.
    • (1992) Communications of the ACM , vol.35 , Issue.7 , pp. 36-40
  • 31
    • 0030572225 scopus 로고    scopus 로고
    • Online Multiple Secret Sharing
    • Pinch, R.G.E., 1996. “Online Multiple Secret Sharing,”. Electronics Letters, 32 (12):1087–1088.
    • (1996) Electronics Letters , vol.32 , Issue.12 , pp. 1087-1088
    • Pinch, R.G.E.1
  • 32
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Shamir, A., 1979. “How to Share a Secret,”. Communications of the ACM, 22 (11):612–613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 33
    • 0033076984 scopus 로고    scopus 로고
    • An application of Ramp Schemes to Broadcast Encryption
    • Stinson, D.R., and Wei, R., 1999. “An application of Ramp Schemes to Broadcast Encryption,”. Information Processing Letters, 69:131–135.
    • (1999) Information Processing Letters , vol.69 , pp. 131-135
    • Stinson, D.R.1    Wei, R.2
  • 34
    • 0032188199 scopus 로고    scopus 로고
    • Secret Sharing in Graph-Based Prohibited Structures
    • Sun, H.M., and Shieh, S.P., 1998. “Secret Sharing in Graph-Based Prohibited Structures,”. Computers and Mathematics with Applications, 36 (7):131–140.
    • (1998) Computers and Mathematics with Applications , vol.36 , Issue.7 , pp. 131-140
    • Sun, H.M.1    Shieh, S.P.2
  • 36
    • 0032627523 scopus 로고    scopus 로고
    • On-line Multiple Secret Sharing Based on a One-Way Function
    • Sun, H.M., 1999. “On-line Multiple Secret Sharing Based on a One-Way Function,”. Computer Communications, 22:745–748.
    • (1999) Computer Communications , vol.22 , pp. 745-748
    • Sun, H.M.1
  • 37
    • 0032623828 scopus 로고    scopus 로고
    • Cheater Identification in (t n) Threshold Scheme
    • Tan, K.J., Zhu, H.W., and Gu, S.J., 1999. “Cheater Identification in (t n) Threshold Scheme,”. Computer Communications, 22:762–765.
    • (1999) Computer Communications , vol.22 , pp. 762-765
    • Tan, K.J.1    Zhu, H.W.2    Gu, S.J.3
  • 38
    • 0032661483 scopus 로고    scopus 로고
    • New Generalized Group-Oriented Cryptosystem Based on Diffie-Hellman Scheme
    • Tsai, J.J., Hwang, T., and Wang, C.H., 1999. “New Generalized Group-Oriented Cryptosystem Based on Diffie-Hellman Scheme,”. Computer Communications, 22:727–729.
    • (1999) Computer Communications , vol.22 , pp. 727-729
    • Tsai, J.J.1    Hwang, T.2    Wang, C.H.3
  • 39
    • 0032628732 scopus 로고    scopus 로고
    • General Secret Sharing Schemes
    • Tan, K.J., and Zhu, H.W., 1999. “General Secret Sharing Schemes,”. Computer Communications, 22:755–757.
    • (1999) Computer Communications , vol.22 , pp. 755-757
    • Tan, K.J.1    Zhu, H.W.2
  • 40
    • 0029211714 scopus 로고
    • A Geometric Approach for Sharing Secrets
    • Wu, T.C., and He, W.H., 1995. “A Geometric Approach for Sharing Secrets,”. Computers & Security, 14:135–145.
    • (1995) Computers & Security , vol.14 , pp. 135-145
    • Wu, T.C.1    He, W.H.2
  • 41
    • 0029369348 scopus 로고
    • Cheating Detection and Cheater Identification in Secret Sharing Schemes
    • Wu, T.C., and Wu, T.S., 1995. “Cheating Detection and Cheater Identification in Secret Sharing Schemes,”. IEE Proceedings- Computers and Digital Techniques, 142:367–369.
    • (1995) IEE Proceedings- Computers and Digital Techniques , vol.142 , pp. 367-369
    • Wu, T.C.1    Wu, T.S.2
  • 43
    • 0028542891 scopus 로고
    • Method for Constructing a Group-Oriented Cipher System
    • Lin, C.H., and Chang, C.C., 1994. “Method for Constructing a Group-Oriented Cipher System,”. Computer Communications, 17 (11):805–808.
    • (1994) Computer Communications , vol.17 , Issue.11 , pp. 805-808
    • Lin, C.H.1    Chang, C.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.