-
1
-
-
85062838317
-
Safeguarding cryptographic keys
-
G. R. Blakley. Safeguarding cryptographic keys. In AFIPS 1979, pages 313-317, 1979.
-
(1979)
AFIPS 1979
, pp. 313-317
-
-
Blakley, G.R.1
-
2
-
-
84948951675
-
Noisy polynomial interpolation and noisy Chinese remaindering
-
Eurocrypt'00, of, Springer, Verlag, May
-
D. Bleichenbacher and P. Q. Nguyen. Noisy polynomial interpolation and noisy Chinese remaindering. In Eurocrypt'00, volume 1807 of LNCS, pages 53 - 69. Springer - Verlag, May 2000.
-
(2000)
LNCS
, vol.1807
, pp. 53-69
-
-
Bleichenbacher, D.1
Nguyen, P.Q.2
-
3
-
-
84996527783
-
Fully dynamic secret sharing schemes
-
Crypto'93, of, Springer, Verlag, August
-
C. Blundo, A. Cresti, A. De Santis, and U. Vaccaro. Fully dynamic secret sharing schemes. In Crypto'93, volume 773 of LNCS, pages 110 - 125. Springer - Verlag, August 1993.
-
(1993)
LNCS
, vol.773
, pp. 110-125
-
-
Blundo, C.1
Cresti, A.2
De Santis, A.3
Vaccaro, U.4
-
4
-
-
33845947188
-
-
Crypto, 5.2.1 benchmarks, July
-
W. Dai. Crypto++ 5.2.1 benchmarks, July 2004.
-
(2004)
-
-
Dai, W.1
-
5
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
Crypto'87, of, Springer, Verlag, August
-
Y. Desmedt. Society and group oriented cryptography: A new concept. In Crypto'87, volume 293 of LNCS, pages 120 - 127. Springer - Verlag, August 1987.
-
(1987)
LNCS
, vol.293
, pp. 120-127
-
-
Desmedt, Y.1
-
6
-
-
0038061165
-
Redistributing secret shares to new access structures and its application
-
TR-97-01, George Mason university
-
Y. Desmedt and S. Jajodia. Redistributing secret shares to new access structures and its application. Technical Report ISSE TR-97-01, George Mason university, 1997.
-
(1997)
Technical Report ISSE
-
-
Desmedt, Y.1
Jajodia, S.2
-
7
-
-
33845940853
-
Verifiable democracy a protocol to secure an electronic legislature
-
EGOV2002, of, Springer, Verlag, September
-
Y. Desmedt and B. King. Verifiable democracy a protocol to secure an electronic legislature. In EGOV2002, volume 2456 of LNCS, pages 460-463. Springer - Verlag, September 2002.
-
(2002)
LNCS
, vol.2456
, pp. 460-463
-
-
Desmedt, Y.1
King, B.2
-
8
-
-
33845925223
-
Error correcting and complexity aspects of linear secret sharing schemes
-
6th International Conference on Information Security, of, Springer, Verlag, October
-
Y. Desmedt, K. Kurosawa, and T. Van Le. Error correcting and complexity aspects of linear secret sharing schemes. In 6th International Conference on Information Security, volume 2851 of LNCS, pages 396 - 407. Springer - Verlag, October 2003.
-
(2003)
LNCS
, vol.2851
, pp. 396-407
-
-
Desmedt, Y.1
Kurosawa, K.2
Van Le, T.3
-
9
-
-
0031375570
-
Optimal-resilience proactive public-key cryptosystems
-
IEEE Press, October
-
Y. Frankel, P. Gemmel, P. D. MacKenzie, and M. Yung. Optimal-resilience proactive public-key cryptosystems. In FOCS'97, pages 384 - 393. IEEE Press, October 1997.
-
(1997)
FOCS'97
, pp. 384-393
-
-
Frankel, Y.1
Gemmel, P.2
MacKenzie, P.D.3
Yung, M.4
-
10
-
-
84976655650
-
Cryptographic computation: Secure fault-tolerant protocols and the public-key model (extended abstract)
-
Crypto '87, of, Springer, Verlag, August
-
Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure fault-tolerant protocols and the public-key model (extended abstract). In Crypto '87, volume 293 of LNCS, pages 135 - 155. Springer - Verlag, August 1987.
-
(1987)
LNCS
, vol.293
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
13
-
-
0033183669
-
Improved decoding of Reed-Solomon and algebraic-geometric codes
-
September
-
V. Guruswami and M. Sudan. Improved decoding of Reed-Solomon and algebraic-geometric codes. IEEE Trans, on Information Theory, 45(6): 1757 - 1767, September 1999.
-
(1999)
IEEE Trans, on Information Theory
, vol.45
, Issue.6
, pp. 1757-1767
-
-
Guruswami, V.1
Sudan, M.2
-
14
-
-
0028508211
-
Group-oriented (t, n)-threshold digital signature scheme and digital multisignature
-
September
-
L. Harn. Group-oriented (t, n)-threshold digital signature scheme and digital multisignature. IEE Proceedings - Computers and Digital Techniques, 141(5):307 - 313, September 1994.
-
(1994)
IEE Proceedings - Computers and Digital Techniques
, vol.141
, Issue.5
, pp. 307-313
-
-
Harn, L.1
-
15
-
-
0036350106
-
-
A. Juels and M. Sudan. A fuzzy vault scheme. In ISIT 2002, page 408. IEEE Press, July 2002. Extended version available at: http://www. rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault. pdf.
-
A. Juels and M. Sudan. A fuzzy vault scheme. In ISIT 2002, page 408. IEEE Press, July 2002. Extended version available at: http://www. rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault. pdf.
-
-
-
-
16
-
-
24944508408
-
Distillation codes and applications to DoS resistant multicast authentication
-
February
-
C. Karlof, N. Sastry, Y. Li, A. Perrig, and J. D. Tygar. Distillation codes and applications to DoS resistant multicast authentication. In NDSS 2004, February 2004.
-
(2004)
NDSS 2004
-
-
Karlof, C.1
Sastry, N.2
Li, Y.3
Perrig, A.4
Tygar, J.D.5
-
17
-
-
0020543282
-
On secret sharing systems
-
January
-
E. D. Karnin, J. W. Greene, and M. E. Hellman. On secret sharing systems. IEEE Transactions on Information Theory, 29(1):35 - 41, January 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.1
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
18
-
-
29844442743
-
A non-interactive modular verifiable secret sharing scheme
-
IEEE Press, May
-
Q. Li, Z. Wang, X. Niu, and S. Sun. A non-interactive modular verifiable secret sharing scheme. In International Conference on Communications, Circuits and Systems, pages 84 - 87. IEEE Press, May 2005.
-
(2005)
International Conference on Communications, Circuits and Systems
, pp. 84-87
-
-
Li, Q.1
Wang, Z.2
Niu, X.3
Sun, S.4
-
20
-
-
84958752925
-
Efficient and unconditionally secure verifiable threshold changeable scheme
-
Springer, Verlag
-
A. Maeda, A. Miyaji, and M. Tada. Efficient and unconditionally secure verifiable threshold changeable scheme. In ACISP 2001, volume 2119 of LNCS, pages 402 - 416. Springer - Verlag, 2001.
-
(2001)
ACISP 2001, volume 2119 of LNCS
, pp. 402-416
-
-
Maeda, A.1
Miyaji, A.2
Tada, M.3
-
21
-
-
0005269075
-
Untrustworthy participants in secret sharing schemes
-
Oxford University Press
-
K. Martin. Untrustworthy participants in secret sharing schemes. In Cryptography and Coding III, pages 255 - 264. Oxford University Press, 1993.
-
(1993)
Cryptography and Coding III
, pp. 255-264
-
-
Martin, K.1
-
22
-
-
33747469206
-
Changing thresholds in the absence of secure channels
-
K. Martin, J. Pieprzyk, R. Safavi-Naini, and H. Wang. Changing thresholds in the absence of secure channels. Australian Computer Journal, 31:34-43, 1999.
-
(1999)
Australian Computer Journal
, vol.31
, pp. 34-43
-
-
Martin, K.1
Pieprzyk, J.2
Safavi-Naini, R.3
Wang, H.4
-
23
-
-
0033351734
-
Bounds and techniques for efficient redistribution of secret shares to new access structures
-
September
-
K. Martin, R. Safavi-Naini, and H. Wang. Bounds and techniques for efficient redistribution of secret shares to new access structures. The Computer Journal, 42(8):638 - 649, September 1999.
-
(1999)
The Computer Journal
, vol.42
, Issue.8
, pp. 638-649
-
-
Martin, K.1
Safavi-Naini, R.2
Wang, H.3
-
24
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
September
-
R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed-Solomon codes. Communications of the ACM, 24(9):583 - 584, September 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.9
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
25
-
-
33646831750
-
Correcting errors beyond the Guruswami-Sudan radius in polynomial time
-
Pittsburgh, USA, October, IEEE Computer Society
-
F. Parvaresh and A. Vardy. Correcting errors beyond the Guruswami-Sudan radius in polynomial time. In 46th Annual IEEE Symposium on Foundations of Computer Science, pages 285 - 294, Pittsburgh, USA, October 2005. IEEE Computer Society.
-
(2005)
46th Annual IEEE Symposium on Foundations of Computer Science
, pp. 285-294
-
-
Parvaresh, F.1
Vardy, A.2
-
27
-
-
84974708355
-
t)
-
Indocrypt 2001, of, Springer, Verlag, December
-
t). In Indocrypt 2001, volume 2247 of LNCS, pages 79 - 90. Springer - Verlag, December 2001.
-
(2001)
LNCS
, vol.2247
, pp. 79-90
-
-
Pieprzyk, J.1
Zhang, X.M.2
-
28
-
-
84949949642
-
Constructions of cheating immune secret sharing
-
ICICS 2001, of, Springer, Verlag, December
-
J. Pieprzyk and X. M. Zhang. Constructions of cheating immune secret sharing. In ICICS 2001, volume 2288 of LNCS, pages 226 - 243. Springer - Verlag, December 2001.
-
(2001)
LNCS
, vol.2288
, pp. 226-243
-
-
Pieprzyk, J.1
Zhang, X.M.2
-
30
-
-
0023532388
-
A hierarchy of polynomial lattice basis reduction algorithms
-
C. P. Schnorr. A hierarchy of polynomial lattice basis reduction algorithms. Theoretical Computer Science, 53:201-224, 1987.
-
(1987)
Theoretical Computer Science
, vol.53
, pp. 201-224
-
-
Schnorr, C.P.1
-
31
-
-
33846200465
-
Lattice basis reduction: Improved practical algorithms and solving subset sum problem
-
August
-
C. P. Schnorr and M. Euchner. Lattice basis reduction: Improved practical algorithms and solving subset sum problem. Math. Programming, 66(1 - 3): 181 - 199, August 1994.
-
(1994)
Math. Programming
, vol.66
, Issue.1 - 3
, pp. 181-199
-
-
Schnorr, C.P.1
Euchner, M.2
-
32
-
-
84957080948
-
A simple publicly verifiable secret sharing scheme and its application to electronic voting
-
Crypto'99, of, Springer, Verlag, August
-
B. Schoenmakers. A simple publicly verifiable secret sharing scheme and its application to electronic voting. In Crypto'99, volume 1666 of LNCS, pages 148-164. Springer - Verlag, August 1999.
-
(1999)
LNCS
, vol.1666
, pp. 148-164
-
-
Schoenmakers, B.1
-
33
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir. How to share a secret. Communication of the ACM, 22(11):612 - 613, November 1979.
-
(1979)
Communication of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
35
-
-
33845960920
-
Lattice-based threshold-changeability for standard Shamir secret-sharing schemes
-
Asiacrypt'04, of, Springer, Verlag, December
-
R. Steinfeld, H. Wang, and J. Pieprzyk. Lattice-based threshold-changeability for standard Shamir secret-sharing schemes. In Asiacrypt'04, volume 3329 of LNCS, pages 170 - 186. Springer - Verlag, December 2004.
-
(2004)
LNCS
, vol.3329
, pp. 170-186
-
-
Steinfeld, R.1
Wang, H.2
Pieprzyk, J.3
-
38
-
-
33845921100
-
-
C. Tang, Z. Liu, and M. Wang. A verifiable secret sharing scheme with statistical zero-knowledge. Avaliable onlne at: http://eprint.iacr.org/2003/222. pdf, October 2003.
-
C. Tang, Z. Liu, and M. Wang. A verifiable secret sharing scheme with statistical zero-knowledge. Avaliable onlne at: http://eprint.iacr.org/2003/222. pdf, October 2003.
-
-
-
-
39
-
-
33744941348
-
Efficient multicast stream authentication for the fully adversarial network
-
WISA 2005, of, Springer, Verlag, August
-
C. Tartary and H. Wang. Efficient multicast stream authentication for the fully adversarial network. In WISA 2005, volume 3786 of LNCS, pages 108 - 125. Springer - Verlag, August 2005.
-
(2005)
LNCS
, vol.3786
, pp. 108-125
-
-
Tartary, C.1
Wang, H.2
-
40
-
-
85008350180
-
How to share a secret with cheaters
-
Crypto'86, of, Springer, Verlag, August
-
M. Tompa and H. Woll. How to share a secret with cheaters. In Crypto'86, volume 263 of LNCS, pages 261 - 265. Springer - Verlag, August 1986.
-
(1986)
LNCS
, vol.263
, pp. 261-265
-
-
Tompa, M.1
Woll, H.2
-
41
-
-
29244431868
-
Cheating immune secret sharing
-
ICICS 2001, of, Springer, Verlag, November
-
X. M. Zhang and J. Pieprzyk. Cheating immune secret sharing. In ICICS 2001, volume 2229 of LNCS, pages 144 - 149. Springer - Verlag, November 2001.
-
(2001)
LNCS
, vol.2229
, pp. 144-149
-
-
Zhang, X.M.1
Pieprzyk, J.2
|