메뉴 건너뛰기




Volumn 2904, Issue , 2003, Pages 162-176

On the power of computational secret sharing

Author keywords

Access structures; Computationally bounded players; Monotone P; Secret sharing

Indexed keywords

ALGEBRA; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION THEORY;

EID: 0346895377     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24582-7_12     Document Type: Article
Times cited : (30)

References (15)
  • 1
    • 84957652167 scopus 로고
    • General short computational secret sharing schemes
    • Advances in Cryptology - EUROCRYPT '95
    • P. Beguin and A. Cresti. General short computational secret sharing schemes. In Advances in Cryptology - EUROCRYPT '95, volume 921 of LNCS, pp. 194-208, 1995.
    • (1995) LNCS , vol.921 , pp. 194-208
    • Beguin, P.1    Cresti, A.2
  • 3
    • 85027202957 scopus 로고
    • Generalized secret sharing and monotone functions
    • proceedings of CRYPTO 88, Springer-Verlag
    • J. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In proceedings of CRYPTO 88, volume 403 of LNCS, pp. 27-36. Springer-Verlag, 1988.
    • (1988) LNCS , vol.403 , pp. 27-36
    • Benaloh, J.1    Leichter, J.2
  • 7
    • 0006838028 scopus 로고
    • Monotone Complexity
    • PATBOOL: Boolean Function Complexity, Cambridge University Press
    • Grigni and Sipser. Monotone Complexity. In PATBOOL: Boolean Function Complexity, London Mathematical Society Lecture Note Series 169, Cambridge University Press, 1992.
    • (1992) London Mathematical Society Lecture Note Series 169
    • Grigni1    Sipser2
  • 8
    • 0023543848 scopus 로고
    • Secret sharing scheme realizing general access structure
    • IEEE
    • M. Ito, A. Saito, and T. Nishizeki. Secret sharing scheme realizing general access structure. In Proceedings of IEEE Globecom 87, pp. 99-102. IEEE, 1987.
    • (1987) Proceedings of IEEE Globecom 87 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 10
    • 85028775022 scopus 로고
    • Secret sharing made short
    • CRYPTO'93
    • H. Krawczyk. Secret sharing made short. In CRYPTO'93, LNCS, pp. 136-146, 1993.
    • (1993) LNCS , pp. 136-146
    • Krawczyk, H.1
  • 11
    • 64049119146 scopus 로고    scopus 로고
    • Efficient Oblivious Transfer Protocols
    • M. Naor and B. Pinkas. Efficient Oblivious Transfer Protocols. In SODA 01, pp. 448-457, 2001.
    • (2001) SODA 01 , pp. 448-457
    • Naor, M.1    Pinkas, B.2
  • 13
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load-balancing and fault-tolerance
    • M. Rabin. Efficient dispersal of information for security, load-balancing and fault-tolerance. JACM, volume 36, pp. 335-348, 1989.
    • (1989) JACM , vol.36 , pp. 335-348
    • Rabin, M.1
  • 14
    • 0037909270 scopus 로고
    • A lower bound on the monotone network complexity of the logical permanent
    • A. Razborov. A lower bound on the monotone network complexity of the logical permanent, (in russian). In Mat. Zametki, volume 37(6), pp. 887-900, 1985.
    • (1985) Mat. Zametki , vol.37 , Issue.6 , pp. 887-900
    • Razborov, A.1
  • 15
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C. Yao. How to generate and exchange secrets. In Proc. of STOC, pp. 162-167, 1986.
    • (1986) Proc. of STOC , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.