메뉴 건너뛰기




Volumn 4117 LNCS, Issue , 2006, Pages 521-536

Algebraic geometric secret sharing schemes and secure multi-party computations over small fields

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION SYSTEMS; COMPUTATIONAL COMPLEXITY; COMPUTATIONAL GEOMETRY; NETWORK PROTOCOLS; NUMERICAL METHODS; SECURITY OF DATA;

EID: 33749554579     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11818175_31     Document Type: Conference Paper
Times cited : (117)

References (39)
  • 1
    • 84898960610 scopus 로고    scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • ACM Press
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. Proceedings of STOC 1988, ACM Press, pp. 1-10.
    • Proceedings of STOC 1988 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 2
    • 0000057495 scopus 로고    scopus 로고
    • Universal hashing and geometric codes
    • J. Bierbrauer. Universal Hashing and Geometric Codes. Designs, Codes and Cryptography, vol. 11, pp. 207-221, 1997.
    • (1997) Designs, Codes and Cryptography , vol.11 , pp. 207-221
    • Bierbrauer, J.1
  • 3
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • Proceedings of National Computer Conference '79
    • G. R. Blakley. Safeguarding cryptographic keys. Proceedings of National Computer Conference '79, volume 48 of AFIPS Proceedings, pp. 313-317, 1979.
    • (1979) AFIPS Proceedings , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 9
    • 33745168657 scopus 로고    scopus 로고
    • Blackbox secret sharing from primitive sets in algebraic number fields
    • Proceedings of CRYPTO 2005, Springer-Verlag
    • R. Cramer, S. Fehr, and M. Stam. Blackbox secret sharing from primitive sets in algebraic number fields. Proceedings of CRYPTO 2005, volume 3621 of LNCS, pp. 344-360, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621 , pp. 344-360
    • Cramer, R.1    Fehr, S.2    Stam, M.3
  • 10
    • 33745134732 scopus 로고    scopus 로고
    • On codes, matroids and secure multi-party computation from linear secret sharing schemes
    • Proceedings of CRYPTO 2005, Springer-Verlag
    • R. Cramer, V. Daza, I. Gracia, J. Jimenez Urroz, G. Leander, J. Martí-Farré, and C. Padró. On codes, matroids and secure multi-party computation from linear secret sharing schemes. Proceedings of CRYPTO 2005, volume 3621 of LNCS, pp. 327-343, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621 , pp. 327-343
    • Cramer, R.1    Daza, V.2    Gracia, I.3    Jimenez Urroz, J.4    Leander, G.5    Martí-Farré, J.6    Padró, C.7
  • 12
    • 35248883422 scopus 로고    scopus 로고
    • Efficient multi-party computation over rings
    • Proceedings of EUROCRYPT 2003, Springer-Verlag
    • R. Cramer, S. Fehr, Y. Ishai, and E. Kushilevitz. Efficient multi-party computation over rings. Proceedings of EUROCRYPT 2003, volume 2656 of LNCS, pp. 596-613, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2656 , pp. 596-613
    • Cramer, R.1    Fehr, S.2    Ishai, Y.3    Kushilevitz, E.4
  • 13
    • 84937432976 scopus 로고    scopus 로고
    • Optimal black-box secret sharing over arbitrary Abelian groups
    • Proceedings of CRYPTO 2002, Springer-Verlag
    • R. Cramer and S. Fehr. Optimal black-box secret sharing over arbitrary Abelian groups. Proceedings of CRYPTO 2002, volume 2442 of LNCS, pp. 272-287, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2442 , pp. 272-287
    • Cramer, R.1    Fehr, S.2
  • 14
    • 0033706246 scopus 로고    scopus 로고
    • On the complexity of verifiable secret sharing and multi-party computation
    • ACM Press
    • R. Cramer, I. Damgaard, and S. Dziembowski. On the complexity of verifiable secret sharing and multi-party computation. Proceedings of STOC 2000, ACM Press, pp. 325-334, 2000.
    • (2000) Proceedings of STOC 2000 , pp. 325-334
    • Cramer, R.1    Damgaard, I.2    Dziembowski, S.3
  • 15
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret sharing scheme
    • Proceedings of EUROCRYPT 2000, Springer-Verlag
    • R. Cramer, I. Damgaard, and U. Maurer. General secure multi-party computation from any linear secret sharing scheme. Proceedings of EUROCRYPT 2000, volume 1807 of LNCS, pp. 316-334, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1807 , pp. 316-334
    • Cramer, R.1    Damgaard, I.2    Maurer, U.3
  • 17
    • 0000527282 scopus 로고
    • Homomorphic zero-knowledge threshold schemes over any finite abelian group
    • Y. Desmedt and Y. Frankel. Homomorphic zero-knowledge threshold schemes over any finite abelian group. SIAM Journal of Discrete Mathematics, 7 (1994), pp. 667-679.
    • (1994) SIAM Journal of Discrete Mathematics , vol.7 , pp. 667-679
    • Desmedt, Y.1    Frankel, Y.2
  • 18
    • 33749542436 scopus 로고
    • On sharing secrets and Reed-Solomon codes
    • November
    • R. J. McEliece and D. V. Sarvate. On sharing secrets and Reed-Solomon codes. Comm. of the ACM, 22(11), November 1979, pp. 612-613.
    • (1979) Comm. of the ACM , vol.22 , Issue.11 , pp. 612-613
    • McEliece, R.J.1    Sarvate, D.V.2
  • 19
  • 21
    • 0030511284 scopus 로고    scopus 로고
    • On the asymptotic behavior of some towers of function fields over finite fields
    • A. García and H. Stichtenoth. On the asymptotic behavior of some towers of function fields over finite fields. J. Number Theory, vol. 61, pp. 248-273, 1996.
    • (1996) J. Number Theory , vol.61 , pp. 248-273
    • García, A.1    Stichtenoth, H.2
  • 22
    • 0034384230 scopus 로고    scopus 로고
    • Tables of curves with many points
    • G. van der Geer and M. van der Vlugt. Tables of curves with many points Mathematics of Computation 69 (2000), 797-810. See also www.science.uva.nl/~geer for regular updates.
    • (2000) Mathematics of Computation , vol.69 , pp. 797-810
    • Van Der Geer, G.1    Van Der Vlugt, M.2
  • 23
    • 0000942249 scopus 로고
    • Codes on algebraic curves
    • V.D. Goppa. Codes on algebraic curves. Soviet Math. Dokl. 24: 170-172, 1981.
    • (1981) Soviet Math. Dokl. , vol.24 , pp. 170-172
    • Goppa, V.D.1
  • 25
    • 84957057937 scopus 로고    scopus 로고
    • Coding constructions for blacklisting problems without computational assumptions
    • Springer-Verlag
    • R. Kumar, S. Rajagopalan, and A. Sahai. Coding constructions for blacklisting problems without computational assumptions. Proceedings of CRYPTO 1999, Springer-Verlag, pp. 609-623, 1999.
    • (1999) Proceedings of CRYPTO 1999 , pp. 609-623
    • Kumar, R.1    Rajagopalan, S.2    Sahai, A.3
  • 26
    • 0034188404 scopus 로고    scopus 로고
    • Constructions of authentication codes from algebraic curves over finite fields
    • K. Y. Lam, H. X. Wang, and C. Xing. Constructions of authentication codes from algebraic curves over finite fields. IEEE Transactions in Information Theory, Vol. 46, 886-892, 2000.
    • (2000) IEEE Transactions in Information Theory , vol.46 , pp. 886-892
    • Lam, K.Y.1    Wang, H.X.2    Xing, C.3
  • 27
    • 0003956970 scopus 로고    scopus 로고
    • Addison-Wesley
    • S. Lang. Algebra. Addison-Wesley, 1997.
    • (1997) Algebra
    • Lang, S.1
  • 31
    • 33749581169 scopus 로고    scopus 로고
    • Function fields over finite fields and their application to cryptography
    • A. Garcia and H. Stichtenoth (Ed.), Springer Verlag, to appear
    • H. Niederreiter, H. Wang, and C. Xing. Function fields over finite fields and their application to cryptography. In: A. Garcia and H. Stichtenoth (Ed.). Topics in geometry, coding theory and cryptography, Springer Verlag, to appear (2006).
    • (2006) Topics in Geometry, Coding Theory and Cryptography
    • Niederreiter, H.1    Wang, H.2    Xing, C.3
  • 32
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proc. ACM STOC 1989, pages 73-85, 1989.
    • (1989) Proc. ACM STOC 1989 , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 33
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Comm. of the ACM, 22(11):612-613, 1979.
    • (1979) Comm. of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 35
    • 0035442521 scopus 로고    scopus 로고
    • A low-complexity algorithm for the construction of algebraic-geometric codes better than the Gilbert-Varshamov bound
    • K.W. Shum, I. Aleshnikov, V.P. Kumar, H. Stichtenoth, V. Deolaikar. A low-complexity algorithm for the construction of algebraic-geometric codes better than the Gilbert-Varshamov bound. IEEE Trans. IT 47 (2001), no. 6, 2225-2241.
    • (2001) IEEE Trans. IT , vol.47 , Issue.6 , pp. 2225-2241
    • Shum, K.W.1    Aleshnikov, I.2    Kumar, V.P.3    Stichtenoth, H.4    Deolaikar, V.5
  • 38
    • 0032073871 scopus 로고    scopus 로고
    • A note on authentication codes from algebraic geometry
    • S. Vladuts. A note on authentication codes from algebraic geometry. IEEE Transactions in Information Theory 44, no. 3, pp. 1342-1345, 1998.
    • (1998) IEEE Transactions in Information Theory , vol.44 , Issue.3 , pp. 1342-1345
    • Vladuts, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.