메뉴 건너뛰기




Volumn 19, Issue 1, 2005, Pages 258-280

On the power of nonlinear secret-sharing

Author keywords

Monotone span programs; Nonlinear secret sharing; Quadratic residuosity; Secret sharing

Indexed keywords

COMPUTATIONAL COMPLEXITY; POLYNOMIALS; SET THEORY;

EID: 33644602159     PISSN: 08954801     EISSN: None     Source Type: Journal    
DOI: 10.1137/S0895480102412868     Document Type: Article
Times cited : (22)

References (64)
  • 2
    • 0040113669 scopus 로고    scopus 로고
    • Superpolynomial lower bounds for monotone span programs
    • L. BABAI, A. GÁL, AND A. WIGDERSON, Superpolynomial lower bounds for monotone span programs, Combinatorica, 19 (1999), pp. 301-319.
    • (1999) Combinatorica , vol.19 , pp. 301-319
    • Babai, L.1    Gál, A.2    Wigderson, A.3
  • 3
    • 0003372863 scopus 로고    scopus 로고
    • Algorithmic number theory
    • MIT Press, Cambridge, MA
    • E. BACH AND J. SHALIT, Algorithmic Number Theory, Vol. 1. Efficient Algorithms, MIT Press, Cambridge, MA, 1996.
    • (1996) Efficient Algorithms , vol.1
    • Bach, E.1    Shalit, J.2
  • 4
    • 84957652167 scopus 로고
    • General short computational secret sharing schemes
    • Advances in Cryptology - EUROCRYPT '95, L. C. Guillou and J. J. Quisquater, eds., Springer-Verlag, Berlin
    • P. BEGUIN AND A. CRESTI, General short computational secret sharing schemes, in Advances in Cryptology - EUROCRYPT '95, L. C. Guillou and J. J. Quisquater, eds., Lect. Notes in Comput. Sci. 921, Springer-Verlag, Berlin, 1995, pp. 194-208.
    • (1995) Lect. Notes in Comput. Sci. , vol.921 , pp. 194-208
    • Beguin, P.1    Cresti, A.2
  • 5
    • 0033873381 scopus 로고    scopus 로고
    • Circuits over PP and PL
    • R. BEIGEL AND B. FU, Circuits over PP and PL, J. Comput. Syst. Sci., 60 (2000), pp. 422-441.
    • (2000) J. Comput. Syst. Sci. , vol.60 , pp. 422-441
    • Beigel, R.1    Fu, B.2
  • 8
    • 0040304685 scopus 로고    scopus 로고
    • Lower bounds for monotone span programs
    • Conference version: FOCS '95
    • A. BEIMEL, A. GAL, AND M. PATERSON, Lower bounds for monotone span programs, Comput. Complexity, 6 (1996/1997), pp. 29-45. Conference version: FOCS '95.
    • (1996) Comput. Complexity , vol.6 , pp. 29-45
    • Beimel, A.1    Gal, A.2    Paterson, M.3
  • 11
    • 85027202957 scopus 로고
    • Generalized secret sharing and monotone functions
    • Advances in Cryptology - CRYPTO '88, S. Goldwasser, ed., Springer-Verlag, Berlin
    • J. BENALOH AND J. LEICHTER, Generalized secret sharing and monotone functions, in Advances in Cryptology - CRYPTO '88, S. Goldwasser, ed., Lect. Notes in Comput. Sci. 403, Springer-Verlag, Berlin, 1990, pp. 27-35.
    • (1990) Lect. Notes in Comput. Sci. , vol.403 , pp. 27-35
    • Benaloh, J.1    Leichter, J.2
  • 12
    • 33644609587 scopus 로고
    • Private communication
    • J. BENALOH AND S. RUDICH, Private communication, 1989.
    • (1989)
    • Benaloh, J.1    Rudich, S.2
  • 13
    • 0021388907 scopus 로고
    • On computing the determinant in small parallel time using a small number of processors
    • S. J. BERKOWITZ, On computing the determinant in small parallel time using a small number of processors, Inform. Process. Lett., 18 (1984), pp. 147-150.
    • (1984) Inform. Process. Lett. , vol.18 , pp. 147-150
    • Berkowitz, S.J.1
  • 14
    • 84984804645 scopus 로고
    • A construction of practical secret sharing schemes using linear block codes
    • Advances in Cryptology - AUSCRYPT '92, J. Seberry and Y. Zheng, eds., Springer-Verlag, Berlin
    • M. BERTILSSON AND I. INGEMARSSON, A construction of practical secret sharing schemes using linear block codes, in Advances in Cryptology - AUSCRYPT '92, J. Seberry and Y. Zheng, eds., Lect. Notes Comput. Sci. 718, Springer-Verlag, Berlin, 1993, pp. 67-79.
    • (1993) Lect. Notes Comput. Sci. , vol.718 , pp. 67-79
    • Bertilsson, M.1    Ingemarsson, I.2
  • 15
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • Proceedings of the 1979 AFIPS National Computer Conference, R. E. Merwin, J. T. Zanca, and M. Smith, eds., AFIPS Press, Arlington, VA
    • G. R. BLAKLEY, Safeguarding cryptographic keys, in Proceedings of the 1979 AFIPS National Computer Conference, R. E. Merwin, J. T. Zanca, and M. Smith, eds., Vol. 48 of AFIPS Conference Proceedings, AFIPS Press, Arlington, VA, 1979, pp. 313-317.
    • (1979) AFIPS Conference Proceedings , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 17
    • 84974588386 scopus 로고    scopus 로고
    • Timed commitments
    • Advances in Cryptology - CRYPTO 2000, M. Bellare, ed., Springer-Verlag, Berlin
    • D. BONEH AND M. NAOR, Timed commitments, in Advances in Cryptology - CRYPTO 2000, M. Bellare, ed., Lect. Notes Comput. Sci. 1880, Springer-Verlag, Berlin, 2000, pp. 236-254.
    • (2000) Lect. Notes Comput. Sci. , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 20
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E. F. BRICKELL AND D. M. DAVENPORT, On the classification of ideal secret sharing schemes, J. Cryptology, 4 (1991), pp. 123-134.
    • (1991) J. Cryptology , vol.4 , pp. 123-134
    • Brickell, E.F.1    Davenport, D.M.2
  • 21
    • 0026992660 scopus 로고
    • Some improved bounds on the information rate of perfect secret sharing schemes
    • E. F. BRICKELL AND D. R. STINSON, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology, 5 (1992), pp. 153-166.
    • (1992) J. Cryptology , vol.5 , pp. 153-166
    • Brickell, E.F.1    Stinson, D.R.2
  • 25
    • 0025224351 scopus 로고
    • An improved parallel algorithm for integer GCD
    • B. CHOR AND O. GOLDREICH, An improved parallel algorithm for integer GCD, Algorithmica, 5 (1990), pp. 1-10.
    • (1990) Algorithmica , vol.5 , pp. 1-10
    • Chor, B.1    Goldreich, O.2
  • 26
    • 0020495011 scopus 로고
    • A taxonomy of problems with fast parallel algorithms
    • S. A. COOK, A taxonomy of problems with fast parallel algorithms, Inform. Control, 64 (1985), pp. 2-22.
    • (1985) Inform. Control , vol.64 , pp. 2-22
    • Cook, S.A.1
  • 28
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • Advances in Cryptology - EUROCRYPT 2000, B. Preneel, ed., Springer-Verlag, Berlin
    • R. CRAMER, I. DAMGÅRD, AND U. MAURER, General secure multi-party computation from any linear secret-sharing scheme, in Advances in Cryptology - EUROCRYPT 2000, B. Preneel, ed., Lect. Notes Comput. Sci. 1807, Springer-Verlag, Berlin, 2000, pp. 316-334.
    • (2000) Lect. Notes Comput. Sci. , vol.1807 , pp. 316-334
    • Cramer, R.1    Damgård, I.2    Maurer, U.3
  • 29
    • 0004020725 scopus 로고    scopus 로고
    • The dealer's random bits in perfect secret sharing schemes
    • L. CSIRMAZ, The dealer's random bits in perfect secret sharing schemes, Studia Sci. Math. Hungar., 32 (1996), pp. 429-437.
    • (1996) Studia Sci. Math. Hungar. , vol.32 , pp. 429-437
    • Csirmaz, L.1
  • 30
    • 0001607361 scopus 로고    scopus 로고
    • The size of a share must be large
    • L. CSIRMAZ, The size of a share must be large, J. Cryptology, 10 (1997), pp. 223-231.
    • (1997) J. Cryptology , vol.10 , pp. 223-231
    • Csirmaz, L.1
  • 31
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • Advances in Cryptology - CRYPTO '91, J. Feigenbaum, ed., Springer-Verlag, Berlin
    • Y. DESMEDT AND Y. FRANKEL, Shared generation of authenticators and signatures, in Advances in Cryptology - CRYPTO '91, J. Feigenbaum, ed., Lect. Notes Comput. Sci. 576, Springer-Verlag, Berlin, 1992, pp. 457-469.
    • (1992) Lect. Notes Comput. Sci. , vol.576 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 32
    • 0000527282 scopus 로고
    • Homomorphic zero-knowledge threshold schemes over any finite abelian group
    • Y. DESMEDT AND Y. FRANKEL, Homomorphic zero-knowledge threshold schemes over any finite abelian group, SIAM J. Discrete Math., 7 (1994), pp. 667-679.
    • (1994) SIAM J. Discrete Math. , vol.7 , pp. 667-679
    • Desmedt, Y.1    Frankel, Y.2
  • 33
    • 0001522694 scopus 로고
    • On the information rate of perfect secret sharing schemes
    • M. v. DIJK, On the information rate of perfect secret sharing schemes, Des. Codes Cryptogr., 6 (1995), pp. 143-169.
    • (1995) Des. Codes Cryptogr. , vol.6 , pp. 143-169
    • Dijk, M.V.1
  • 34
    • 0003944144 scopus 로고    scopus 로고
    • A linear construction of secret sharing schemes
    • M. v. DIJK, A linear construction of secret sharing schemes, Des. Codes Cryptogr., 12 (1997), pp. 161-201.
    • (1997) Des. Codes Cryptogr. , vol.12 , pp. 161-201
    • Dijk, M.V.1
  • 35
    • 0032185250 scopus 로고    scopus 로고
    • Efficient algorithms for computing the Jacobi symbol
    • S. M. EIKENBERRY AND J. P. SORENSON, Efficient algorithms for computing the Jacobi symbol, J. Symb. Comput., 26 (1998), pp. 509-523.
    • (1998) J. Symb. Comput. , vol.26 , pp. 509-523
    • Eikenberry, S.M.1    Sorenson, J.P.2
  • 38
    • 0031623892 scopus 로고    scopus 로고
    • A characterization of span program size and improved lower bounds for monotone span programs
    • Dallas
    • A. GAL, A characterization of span program size and improved lower bounds for monotone span programs, in Proceedings of the 30th Annual ACM Symposium on the Theory of Computing, Dallas, 1998, pp. 429-437.
    • (1998) Proceedings of the 30th Annual ACM Symposium on the Theory of Computing , pp. 429-437
    • Gal, A.1
  • 39
    • 0002711066 scopus 로고
    • The monotone and planar circuit value problem is complete for P
    • L. GOLDSCHLAGER, The monotone and planar circuit value problem is complete for P, SIGACT News, 9 (1977), pp. 25-27.
    • (1977) SIGACT News , vol.9 , pp. 25-27
    • Goldschlager, L.1
  • 41
    • 0000490812 scopus 로고    scopus 로고
    • A survey of fast exponentiation methods
    • D. M. GORDON, A survey of fast exponentiation methods, J. Algorithms, 27 (1998), pp. 129-146.
    • (1998) J. Algorithms , vol.27 , pp. 129-146
    • Gordon, D.M.1
  • 42
    • 0004003953 scopus 로고    scopus 로고
    • The shrinkage exponent of de Morgan formulas is 2
    • J. HÅSTAD, The shrinkage exponent of De Morgan formulas is 2, SIAM J. Comput., 27 (1998), pp. 48-64.
    • (1998) SIAM J. Comput. , vol.27 , pp. 48-64
    • Håstad, J.1
  • 44
    • 0023543848 scopus 로고
    • Secret sharing schemes realizing general access structure
    • Proceedings of the IEEE Global Telecommunication Conference
    • M. ITO, A. SAITO, AND T. NISHIZEKI, Secret sharing schemes realizing general access structure, in Proceedings of the IEEE Global Telecommunication Conference, Globecom 87, 1987, pp. 99-102.
    • (1987) Globecom , vol.87 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 45
    • 0027289776 scopus 로고
    • Multiple assignment scheme for sharing secret
    • Journal version
    • Journal version: Multiple Assignment Scheme for Sharing Secret, J. Cryptology, 6 (1993), pp. 15-20.
    • (1993) J. Cryptology , vol.6 , pp. 15-20
  • 46
    • 0023287513 scopus 로고
    • Sublinear parallel algorithm for computing the greatest common divisor of two integers
    • R. KANNAN, G. L. MILLER, AND L. RUDOLPH, Sublinear parallel algorithm for computing the greatest common divisor of two integers, SIAM J. Comput., 16 (1987), pp. 7-16.
    • (1987) SIAM J. Comput. , vol.16 , pp. 7-16
    • Kannan, R.1    Miller, G.L.2    Rudolph, L.3
  • 48
    • 85028775022 scopus 로고
    • Secret sharing made short
    • Advances in Cryptology - CRYPTO '93, D. R. Stinson, ed., Springer-Verlag, Berlin
    • H. KRAWCZYK, Secret sharing made short, in Advances in Cryptology - CRYPTO '93, D. R. Stinson, ed., Lect. Notes Comput. Sci. 773, Springer-Verlag, Berlin, 1994, pp. 136-146.
    • (1994) Lect. Notes Comput. Sci. , vol.773 , pp. 136-146
    • Krawczyk, H.1
  • 49
    • 0002885219 scopus 로고
    • New secret sharing schemes from old
    • K. M. MARTIN, New secret sharing schemes from old, J. Combin. Math. Combin. Comput., 14 (1993), pp. 65-77.
    • (1993) J. Combin. Math. Combin. Comput. , vol.14 , pp. 65-77
    • Martin, K.M.1
  • 51
    • 51249173165 scopus 로고
    • A fast parallel algorithm to compute the rank of a matrix over an arbitrary field
    • K. MULMULEY, A fast parallel algorithm to compute the rank of a matrix over an arbitrary field, Combinatorica, 7 (1987), pp. 101-104.
    • (1987) Combinatorica , vol.7 , pp. 101-104
    • Mulmuley, K.1
  • 53
    • 84947905037 scopus 로고    scopus 로고
    • A nonlinear secret sharing scheme
    • ACISP: Information Security and Privacy: Australasian Conference, Springer-Verlag, Berlin
    • A. RENVALL AND C. DING, A nonlinear secret sharing scheme, in ACISP: Information Security and Privacy: Australasian Conference, Lect. Notes Comput. Sci. 1172, Springer-Verlag, Berlin, 1996, pp. 56-66.
    • (1996) Lect. Notes Comput. Sci. , vol.1172 , pp. 56-66
    • Renvall, A.1    Ding, C.2
  • 54
    • 0018545449 scopus 로고
    • How to share a secret
    • A. SHAMIR, How to share a secret, Comm. ACM, 22 (1979), pp. 612-613.
    • (1979) Comm. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 55
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control and their application
    • The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, Piscataway, NJ
    • G. J. SIMMONS, An introduction to shared secret and/or shared control and their application, in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, Piscataway, NJ, 1992, pp. 441-497.
    • (1992) Contemporary Cryptology , pp. 441-497
    • Simmons, G.J.1
  • 58
    • 38149143955 scopus 로고
    • Two fast GCD algorithms
    • J. SORENSON, Two fast GCD algorithms, J. Algorithms, 16 (1994), pp. 110-144.
    • (1994) J. Algorithms , vol.16 , pp. 110-144
    • Sorenson, J.1
  • 60
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • D. R. STINSON, An explication of secret sharing schemes, Des. Codes Cryptogr., 2 (1992), pp. 357-390.
    • (1992) Des. Codes Cryptogr. , vol.2 , pp. 357-390
    • Stinson, D.R.1
  • 61
    • 85028945826 scopus 로고
    • New general lower bounds on the information rate of secret sharing schemes
    • Advances in Cryptology - CRYPTO '92, E. F. Brickell, ed., Springer-Verlag, Berlin
    • D. R. STINSON, New general lower bounds on the information rate of secret sharing schemes, in Advances in Cryptology - CRYPTO '92, E. F. Brickell, ed., Lect. Notes Comput. Sci. 740, Springer-Verlag, Berlin, 1993, pp. 168-182.
    • (1993) Lect. Notes Comput. Sci. , vol.740 , pp. 168-182
    • Stinson, D.R.1
  • 62
    • 0029327136 scopus 로고
    • An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions
    • D. R. STINSON AND J. L. MASSEY, An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions, J. Cryptology, 8 (1995), pp. 167-173.
    • (1995) J. Cryptology , vol.8 , pp. 167-173
    • Stinson, D.R.1    Massey, J.L.2
  • 63
    • 0000248498 scopus 로고
    • A combinatorial approach to threshold schemes
    • D. R. STINSON AND S. A. VANSTONE, A combinatorial approach to threshold schemes, SIAM J. Discrete Math., 1 (1988), pp. 230-236.
    • (1988) SIAM J. Discrete Math. , vol.1 , pp. 230-236
    • Stinson, D.R.1    Vanstone, S.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.