메뉴 건너뛰기




Volumn 15, Issue 3, 1998, Pages 301-321

A General Decomposition Construction for Incomplete Secret Sharing Schemes

Author keywords

Cryptology; Information theory; Secret sharing

Indexed keywords


EID: 0141948319     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1023/a:1008381427667     Document Type: Article
Times cited : (19)

References (30)
  • 1
    • 84957652167 scopus 로고
    • General short computational secret sharing schemes
    • Adv. in Cryptology: EUROCRYPT '95
    • P. Beguin and A. Cresti, General short computational secret sharing schemes, Adv. in Cryptology: EUROCRYPT '95, Lecture Notes in Comput. Sci., 921 (1995) pp. 194-208.
    • (1995) Lecture Notes in Comput. Sci. , vol.921 , pp. 194-208
    • Beguin, P.1    Cresti, A.2
  • 2
    • 0346870109 scopus 로고
    • How to say no
    • Advances in Cryptology: Proceedings of EUROCRYPT '89
    • A. Beutelspacher, How to say no, Advances in Cryptology: Proceedings of EUROCRYPT '89, Lecture Notes in Comput. Sci., 434 (1990) pp. 491-496.
    • (1990) Lecture Notes in Comput. Sci. , vol.434 , pp. 491-496
    • Beutelspacher, A.1
  • 3
    • 21844502521 scopus 로고
    • On general perfect secret sharing schemes
    • Adv. in Cryptology: CRYPTO'95
    • G. R. Blakley and G. A. Kabatianski, On general perfect secret sharing schemes, Adv. in Cryptology: CRYPTO'95, Lecture Notes in Comput. Sci., 963 (1995) pp. 367-371.
    • (1995) Lecture Notes in Comput. Sci. , vol.963 , pp. 367-371
    • Blakley, G.R.1    Kabatianski, G.A.2
  • 4
    • 84961369151 scopus 로고
    • Security of ramp schemes
    • Adv. in Cryptology: CRYPTO '84
    • G. R. Blakley and C. Meadows, Security of ramp schemes, Adv. in Cryptology: CRYPTO '84, Lecture Notes in Comput. Sci., 196 (1985) pp. 242-268.
    • (1985) Lecture Notes in Comput. Sci. , vol.196 , pp. 242-268
    • Blakley, G.R.1    Meadows, C.2
  • 8
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E. F. Brickell and D. M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptology, Vol. 4 (1991) pp. 123-134.
    • (1991) J. Cryptology , vol.4 , pp. 123-134
    • Brickell, E.F.1    Davenport, D.M.2
  • 9
    • 0026992660 scopus 로고
    • Some improved bounds on the information rate of perfect secret sharing schemes
    • E. F. Brickell and D. R. Stinson, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology, Vol. 5 (1992) pp. 153-166.
    • (1992) J. Cryptology , vol.5 , pp. 153-166
    • Brickell, E.F.1    Stinson, D.R.2
  • 13
    • 0001522694 scopus 로고
    • On the information rate of perfect secret sharing schemes
    • M. van Dijk, On the information rate of perfect secret sharing schemes, Designs, Codes, and Cryptography, Vol. 6 (1995) pp. 143-169.
    • (1995) Designs, Codes, and Cryptography , vol.6 , pp. 143-169
    • Van Dijk, M.1
  • 14
    • 0003944144 scopus 로고    scopus 로고
    • A linear construction of secret sharing schemes
    • M. van Dijk, A linear construction of secret sharing schemes, Designs, Codes and Cryptography., Vol. 12 (1997) pp. 161-201.
    • (1997) Designs, Codes and Cryptography , vol.12 , pp. 161-201
    • Van Dijk, M.1
  • 17
    • 0001652944 scopus 로고    scopus 로고
    • Perfect secret sharing schemes on five participants
    • W.-A. Jackson and K. M. Martin, Perfect secret sharing schemes on five participants, Designs, Codes and Cryptography, Vol. 9 (1996) pp. 267-286.
    • (1996) Designs, Codes and Cryptography , vol.9 , pp. 267-286
    • Jackson, W.-A.1    Martin, K.M.2
  • 18
    • 84957692463 scopus 로고
    • Efficient secret sharing without a mutually trusted authority
    • Adv. in Cryptology: EUROCRYPT '95
    • W.-A. Jackson, K. M. Martin, and C. M. O'Keefe, Efficient secret sharing without a mutually trusted authority, Adv. in Cryptology: EUROCRYPT '95, Lecture Notes in Comput. Sci., 921 (1995) pp. 183-193.
    • (1995) Lecture Notes in Comput. Sci. , vol.921 , pp. 183-193
    • Jackson, W.-A.1    Martin, K.M.2    O'Keefe, C.M.3
  • 19
    • 0032217850 scopus 로고    scopus 로고
    • An algorithm for efficient geometric secret sharing schemes
    • to appear
    • W.-A. Jackson and K. M. Martin, An algorithm for efficient geometric secret sharing schemes, to appear in Utilitas Mathematica.
    • Utilitas Mathematica
    • Jackson, W.-A.1    Martin, K.M.2
  • 20
    • 84985848633 scopus 로고
    • Nonperfect secret sharing schemes and matroids
    • Adv. in Cryptology: EUROCRYPT '93
    • K. Kurosawa, K. Okada, K. Sakano, W. Ogata, and S. Tsujii, Nonperfect secret sharing schemes and matroids, Adv. in Cryptology: EUROCRYPT '93, Lecture Notes in Comput. Sci., 765 (1994) pp. 126-141.
    • (1994) Lecture Notes in Comput. Sci. , vol.765 , pp. 126-141
    • Kurosawa, K.1    Okada, K.2    Sakano, K.3    Ogata, W.4    Tsujii, S.5
  • 23
    • 0346648727 scopus 로고
    • Nonperfect secret sharing schemes
    • Adv. in Cryptology: AUSCRYPT '92
    • W. Ogata, K. Kurosawa, and S. Tsujii, Nonperfect secret sharing schemes, Adv. in Cryptology: AUSCRYPT '92, Lecture Notes in Comput. Sci., 718 (1993) pp. 56-66.
    • (1993) Lecture Notes in Comput. Sci. , vol.718 , pp. 56-66
    • Ogata, W.1    Kurosawa, K.2    Tsujii, S.3
  • 24
    • 84955616848 scopus 로고
    • Lower bound on the size of shares of nonperfect secret sharing schemes
    • Proceedings of ASIACRYPT '94
    • K. Okada and K. Kurosawa, Lower bound on the size of shares of nonperfect secret sharing schemes, Proceedings of ASIACRYPT '94, Lecture Notes in Comput. Sci., (1995) pp. 33-41.
    • (1995) Lecture Notes in Comput. Sci. , pp. 33-41
    • Okada, K.1    Kurosawa, K.2
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Commun. of the ACM, Vol. 22 (1979) pp. 612-613.
    • (1979) Commun. of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 26
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control schemes and their application
    • (G. J. Simmons, ed.), IEEE Press
    • G. J. Simmons, An introduction to shared secret and/or shared control schemes and their application, Contemporary Cryptology, The Science of Information Integrity, (G. J. Simmons, ed.), IEEE Press (1992).
    • (1992) Contemporary Cryptology, the Science of Information Integrity
    • Simmons, G.J.1
  • 28
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • D. R. Stinson, An explication of secret sharing schemes, Designs, Codes and Cryptography, Vol. 2 (1992) pp. 357-390.
    • (1992) Designs, Codes and Cryptography , vol.2 , pp. 357-390
    • Stinson, D.R.1
  • 29
    • 85028945826 scopus 로고
    • New general lower bounds on the information rate of secret sharing schemes
    • Advances in Cryptology: CRYPTO '92
    • D. R. Stinson. New general lower bounds on the information rate of secret sharing schemes, Advances in Cryptology: CRYPTO '92, Lecture Notes in Comput. Sci., 740 (1993) pp. 168-182.
    • (1993) Lecture Notes in Comput. Sci. , vol.740 , pp. 168-182
    • Stinson, D.R.1
  • 30
    • 0028323999 scopus 로고
    • Decomposition constructions for secret sharing schemes
    • D. R. Stinson, Decomposition constructions for secret sharing schemes, IEEE Trans. Inform. Theory, Vol. IT-40 (1994) pp. 118-125.
    • (1994) IEEE Trans. Inform. Theory , vol.IT-40 , pp. 118-125
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.