메뉴 건너뛰기




Volumn 3378, Issue , 2005, Pages 600-619

Characterizing ideal weighted threshold secret sharing

Author keywords

[No Author keywords available]

Indexed keywords

MATRIX ALGEBRA; SECURITY OF DATA; SET THEORY;

EID: 24144494482     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30576-7_32     Document Type: Conference Paper
Times cited : (58)

References (33)
  • 1
    • 0028429265 scopus 로고
    • Universally ideal secret sharing schemes
    • A. Beimel and B. Chor. Universally ideal secret sharing schemes. IEEE Trans. on Information Theory, 40(3):786-794, 1994.
    • (1994) IEEE Trans. on Information Theory , vol.40 , Issue.3 , pp. 786-794
    • Beimel, A.1    Chor, B.2
  • 2
    • 33645595978 scopus 로고    scopus 로고
    • Characterizing ideal weighted threshold secret sharing
    • Dept. of Computer Science, Ben-Gurion University
    • A. Beimel, T. Tassa, and E. Weinreb. Characterizing ideal weighted threshold secret sharing. Technical Report 04-05, Dept. of Computer Science, Ben-Gurion University, 2004. Available at: www.cs.bgu.ac.il/~beimel/pub.html.
    • (2004) Technical Report , vol.4 , Issue.5
    • Beimel, A.1    Tassa, T.2    Weinreb, E.3
  • 4
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computations
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computations. In 20th STOC, 1-10, 1988.
    • (1988) 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 85027202957 scopus 로고
    • Generalized secret sharing and monotone functions
    • CRYPTO'88
    • J. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In CRYPTO'88, volume 403 of LNCS, pages 27-35. 1990.
    • (1990) LNCS , vol.403 , pp. 27-35
    • Benaloh, J.1    Leichter, J.2
  • 8
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E. F. Brickell and D. M. Davenport. On the classification of ideal secret sharing schemes. J. of Cryptology, 4(73):123-134, 1991.
    • (1991) J. of Cryptology , vol.4 , Issue.73 , pp. 123-134
    • Brickell, E.F.1    Davenport, D.M.2
  • 9
    • 0026992660 scopus 로고
    • Some improved bounds on the information rate of perfect secret sharing schemes
    • E. F. Brickell and D. R. Stinson. Some improved bounds on the information rate of perfect secret sharing schemes. J. of Cryptology, 5(3):153-166, 1992.
    • (1992) J. of Cryptology , vol.5 , Issue.3 , pp. 153-166
    • Brickell, E.F.1    Stinson, D.R.2
  • 12
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • EUROCRYPT 2000
    • R. Cramer, I. Damgård, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In EUROCRYPT 2000, volume 1807 of LNCS, pages 316-334. 2000.
    • (2000) LNCS , vol.1807 , pp. 316-334
    • Cramer, R.1    Damgård, I.2    Maurer, U.3
  • 13
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • CRYPTO'91
    • Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In CRYPTO'91, volume 576 of LNCS, pages 457-469. 1992.
    • (1992) LNCS , vol.576 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 14
    • 0023543848 scopus 로고
    • Secret sharing schemes realizing general access structure
    • M. Ito, A. Saito, and T. Nishizeki. Secret sharing schemes realizing general access structure. In Proc. of Globecom 87, pages 99-102, 1987.
    • (1987) Proc. of Globecom 87 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 15
    • 0013229183 scopus 로고    scopus 로고
    • Ideal secret sharing schemes with multiple secrets
    • W. Jackson, K. M. Martin, and C. M. O'Keefe. Ideal secret sharing schemes with multiple secrets. J. of Cryptology, 9(4):233-250, 1996.
    • (1996) J. of Cryptology , vol.9 , Issue.4 , pp. 233-250
    • Jackson, W.1    Martin, K.M.2    O'Keefe, C.M.3
  • 18
    • 33645601443 scopus 로고    scopus 로고
    • Secret sharing schemes on access structures with intersection number equal to one
    • 3rd SCN
    • J. Martí-Farré and C. Padró. Secret sharing schemes on access structures with intersection number equal to one. 3rd SCN, vol. 2576 of LNCS, pp. 354-363. 2002.
    • (2002) LNCS , vol.2576 , pp. 354-363
    • Martí-Farré, J.1    Padró, C.2
  • 23
    • 0034315039 scopus 로고    scopus 로고
    • Secret sharing schemes with bipartite access structure
    • C. Padró and G. Sáez. Secret sharing schemes with bipartite access structure. IEEE Trans. on Information Theory, 46:2596-2605, 2000.
    • (2000) IEEE Trans. on Information Theory , vol.46 , pp. 2596-2605
    • Padró, C.1    Sáez, G.2
  • 27
    • 84898132112 scopus 로고
    • How to (really) share a secret
    • CRYPTO'88
    • G. J. Simmons. How to (really) share a secret. In CRYPTO'88, volume 403 of LNCS, pages 390-448. 1990.
    • (1990) LNCS , vol.403 , pp. 390-448
    • Simmons, G.J.1
  • 28
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control and their application
    • IEEE Press
    • G. J. Simmons. An introduction to shared secret and/or shared control and their application. In Contemporary Cryptology, The Science of Information Integrity, pages 441-497. IEEE Press, 1992.
    • (1992) Contemporary Cryptology, The Science of Information Integrity , pp. 441-497
    • Simmons, G.J.1
  • 31
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • D. R. Stinson. An explication of secret sharing schemes. Designs, Codes and Cryptography, 2:357-390, 1992.
    • (1992) Designs, Codes and Cryptography , vol.2 , pp. 357-390
    • Stinson, D.R.1
  • 32
    • 85028945826 scopus 로고
    • New general lower bounds on the information rate of secret sharing schemes
    • CRYPTO'92
    • D. R. Stinson. New general lower bounds on the information rate of secret sharing schemes. In CRYPTO'92, volume 740 of LNCS, pages 168-182. 1993.
    • (1993) LNCS , vol.740 , pp. 168-182
    • Stinson, D.R.1
  • 33
    • 35048827923 scopus 로고    scopus 로고
    • Hierarchical threshold secret sharing
    • M. Naor, editor, First Theory of Cryptography Conference, TCC 2004
    • T. Tassa. Hierarchical threshold secret sharing. In M. Naor, editor, First Theory of Cryptography Conference, TCC 2004, volume 2951 of LNCS, pages 473-490. 2004.
    • (2004) LNCS , vol.2951 , pp. 473-490
    • Tassa, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.