메뉴 건너뛰기




Volumn 4318 LNCS, Issue , 2006, Pages 103-117

Dynamic threshold and cheater resistance for shamir secret sharing scheme

Author keywords

Cheater resistance; Insecure network; Polynomial reconstruction problem; Secret sharing scheme; Threshold changeability

Indexed keywords

ALGORITHMS; COMPUTATIONAL COMPLEXITY; PARAMETER ESTIMATION; POLYNOMIALS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33845927130     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11937807_9     Document Type: Conference Paper
Times cited : (13)

References (41)
  • 1
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • G. R. Blakley. Safeguarding cryptographic keys. In AFIPS 1979, pages 313-317, 1979.
    • (1979) AFIPS 1979 , pp. 313-317
    • Blakley, G.R.1
  • 2
    • 84948951675 scopus 로고    scopus 로고
    • Noisy polynomial interpolation and noisy Chinese remaindering
    • Eurocrypt'00, of, Springer, Verlag, May
    • D. Bleichenbacher and P. Q. Nguyen. Noisy polynomial interpolation and noisy Chinese remaindering. In Eurocrypt'00, volume 1807 of LNCS, pages 53 - 69. Springer - Verlag, May 2000.
    • (2000) LNCS , vol.1807 , pp. 53-69
    • Bleichenbacher, D.1    Nguyen, P.Q.2
  • 3
    • 84996527783 scopus 로고
    • Fully dynamic secret sharing schemes
    • Crypto'93, of, Springer, Verlag, August
    • C. Blundo, A. Cresti, A. De Santis, and U. Vaccaro. Fully dynamic secret sharing schemes. In Crypto'93, volume 773 of LNCS, pages 110 - 125. Springer - Verlag, August 1993.
    • (1993) LNCS , vol.773 , pp. 110-125
    • Blundo, C.1    Cresti, A.2    De Santis, A.3    Vaccaro, U.4
  • 4
    • 33845947188 scopus 로고    scopus 로고
    • Crypto, 5.2.1 benchmarks, July
    • W. Dai. Crypto++ 5.2.1 benchmarks, July 2004.
    • (2004)
    • Dai, W.1
  • 5
    • 85032188633 scopus 로고
    • Society and group oriented cryptography: A new concept
    • Crypto'87, of, Springer, Verlag, August
    • Y. Desmedt. Society and group oriented cryptography: A new concept. In Crypto'87, volume 293 of LNCS, pages 120 - 127. Springer - Verlag, August 1987.
    • (1987) LNCS , vol.293 , pp. 120-127
    • Desmedt, Y.1
  • 6
    • 0038061165 scopus 로고    scopus 로고
    • Redistributing secret shares to new access structures and its application
    • TR-97-01, George Mason university
    • Y. Desmedt and S. Jajodia. Redistributing secret shares to new access structures and its application. Technical Report ISSE TR-97-01, George Mason university, 1997.
    • (1997) Technical Report ISSE
    • Desmedt, Y.1    Jajodia, S.2
  • 7
    • 33845940853 scopus 로고    scopus 로고
    • Verifiable democracy a protocol to secure an electronic legislature
    • EGOV2002, of, Springer, Verlag, September
    • Y. Desmedt and B. King. Verifiable democracy a protocol to secure an electronic legislature. In EGOV2002, volume 2456 of LNCS, pages 460-463. Springer - Verlag, September 2002.
    • (2002) LNCS , vol.2456 , pp. 460-463
    • Desmedt, Y.1    King, B.2
  • 8
    • 33845925223 scopus 로고    scopus 로고
    • Error correcting and complexity aspects of linear secret sharing schemes
    • 6th International Conference on Information Security, of, Springer, Verlag, October
    • Y. Desmedt, K. Kurosawa, and T. Van Le. Error correcting and complexity aspects of linear secret sharing schemes. In 6th International Conference on Information Security, volume 2851 of LNCS, pages 396 - 407. Springer - Verlag, October 2003.
    • (2003) LNCS , vol.2851 , pp. 396-407
    • Desmedt, Y.1    Kurosawa, K.2    Van Le, T.3
  • 9
    • 0031375570 scopus 로고    scopus 로고
    • Optimal-resilience proactive public-key cryptosystems
    • IEEE Press, October
    • Y. Frankel, P. Gemmel, P. D. MacKenzie, and M. Yung. Optimal-resilience proactive public-key cryptosystems. In FOCS'97, pages 384 - 393. IEEE Press, October 1997.
    • (1997) FOCS'97 , pp. 384-393
    • Frankel, Y.1    Gemmel, P.2    MacKenzie, P.D.3    Yung, M.4
  • 10
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure fault-tolerant protocols and the public-key model (extended abstract)
    • Crypto '87, of, Springer, Verlag, August
    • Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure fault-tolerant protocols and the public-key model (extended abstract). In Crypto '87, volume 293 of LNCS, pages 135 - 155. Springer - Verlag, August 1987.
    • (1987) LNCS , vol.293 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 13
    • 0033183669 scopus 로고    scopus 로고
    • Improved decoding of Reed-Solomon and algebraic-geometric codes
    • September
    • V. Guruswami and M. Sudan. Improved decoding of Reed-Solomon and algebraic-geometric codes. IEEE Trans, on Information Theory, 45(6): 1757 - 1767, September 1999.
    • (1999) IEEE Trans, on Information Theory , vol.45 , Issue.6 , pp. 1757-1767
    • Guruswami, V.1    Sudan, M.2
  • 14
    • 0028508211 scopus 로고
    • Group-oriented (t, n)-threshold digital signature scheme and digital multisignature
    • September
    • L. Harn. Group-oriented (t, n)-threshold digital signature scheme and digital multisignature. IEE Proceedings - Computers and Digital Techniques, 141(5):307 - 313, September 1994.
    • (1994) IEE Proceedings - Computers and Digital Techniques , vol.141 , Issue.5 , pp. 307-313
    • Harn, L.1
  • 15
    • 0036350106 scopus 로고    scopus 로고
    • A. Juels and M. Sudan. A fuzzy vault scheme. In ISIT 2002, page 408. IEEE Press, July 2002. Extended version available at: http://www. rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault. pdf.
    • A. Juels and M. Sudan. A fuzzy vault scheme. In ISIT 2002, page 408. IEEE Press, July 2002. Extended version available at: http://www. rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault. pdf.
  • 16
    • 24944508408 scopus 로고    scopus 로고
    • Distillation codes and applications to DoS resistant multicast authentication
    • February
    • C. Karlof, N. Sastry, Y. Li, A. Perrig, and J. D. Tygar. Distillation codes and applications to DoS resistant multicast authentication. In NDSS 2004, February 2004.
    • (2004) NDSS 2004
    • Karlof, C.1    Sastry, N.2    Li, Y.3    Perrig, A.4    Tygar, J.D.5
  • 20
    • 84958752925 scopus 로고    scopus 로고
    • Efficient and unconditionally secure verifiable threshold changeable scheme
    • Springer, Verlag
    • A. Maeda, A. Miyaji, and M. Tada. Efficient and unconditionally secure verifiable threshold changeable scheme. In ACISP 2001, volume 2119 of LNCS, pages 402 - 416. Springer - Verlag, 2001.
    • (2001) ACISP 2001, volume 2119 of LNCS , pp. 402-416
    • Maeda, A.1    Miyaji, A.2    Tada, M.3
  • 21
    • 0005269075 scopus 로고
    • Untrustworthy participants in secret sharing schemes
    • Oxford University Press
    • K. Martin. Untrustworthy participants in secret sharing schemes. In Cryptography and Coding III, pages 255 - 264. Oxford University Press, 1993.
    • (1993) Cryptography and Coding III , pp. 255-264
    • Martin, K.1
  • 23
    • 0033351734 scopus 로고    scopus 로고
    • Bounds and techniques for efficient redistribution of secret shares to new access structures
    • September
    • K. Martin, R. Safavi-Naini, and H. Wang. Bounds and techniques for efficient redistribution of secret shares to new access structures. The Computer Journal, 42(8):638 - 649, September 1999.
    • (1999) The Computer Journal , vol.42 , Issue.8 , pp. 638-649
    • Martin, K.1    Safavi-Naini, R.2    Wang, H.3
  • 24
    • 0019608784 scopus 로고
    • On sharing secrets and Reed-Solomon codes
    • September
    • R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed-Solomon codes. Communications of the ACM, 24(9):583 - 584, September 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.9 , pp. 583-584
    • McEliece, R.J.1    Sarwate, D.V.2
  • 25
    • 33646831750 scopus 로고    scopus 로고
    • Correcting errors beyond the Guruswami-Sudan radius in polynomial time
    • Pittsburgh, USA, October, IEEE Computer Society
    • F. Parvaresh and A. Vardy. Correcting errors beyond the Guruswami-Sudan radius in polynomial time. In 46th Annual IEEE Symposium on Foundations of Computer Science, pages 285 - 294, Pittsburgh, USA, October 2005. IEEE Computer Society.
    • (2005) 46th Annual IEEE Symposium on Foundations of Computer Science , pp. 285-294
    • Parvaresh, F.1    Vardy, A.2
  • 27
    • 84974708355 scopus 로고    scopus 로고
    • t)
    • Indocrypt 2001, of, Springer, Verlag, December
    • t). In Indocrypt 2001, volume 2247 of LNCS, pages 79 - 90. Springer - Verlag, December 2001.
    • (2001) LNCS , vol.2247 , pp. 79-90
    • Pieprzyk, J.1    Zhang, X.M.2
  • 28
    • 84949949642 scopus 로고    scopus 로고
    • Constructions of cheating immune secret sharing
    • ICICS 2001, of, Springer, Verlag, December
    • J. Pieprzyk and X. M. Zhang. Constructions of cheating immune secret sharing. In ICICS 2001, volume 2288 of LNCS, pages 226 - 243. Springer - Verlag, December 2001.
    • (2001) LNCS , vol.2288 , pp. 226-243
    • Pieprzyk, J.1    Zhang, X.M.2
  • 30
    • 0023532388 scopus 로고
    • A hierarchy of polynomial lattice basis reduction algorithms
    • C. P. Schnorr. A hierarchy of polynomial lattice basis reduction algorithms. Theoretical Computer Science, 53:201-224, 1987.
    • (1987) Theoretical Computer Science , vol.53 , pp. 201-224
    • Schnorr, C.P.1
  • 31
    • 33846200465 scopus 로고
    • Lattice basis reduction: Improved practical algorithms and solving subset sum problem
    • August
    • C. P. Schnorr and M. Euchner. Lattice basis reduction: Improved practical algorithms and solving subset sum problem. Math. Programming, 66(1 - 3): 181 - 199, August 1994.
    • (1994) Math. Programming , vol.66 , Issue.1 - 3 , pp. 181-199
    • Schnorr, C.P.1    Euchner, M.2
  • 32
    • 84957080948 scopus 로고    scopus 로고
    • A simple publicly verifiable secret sharing scheme and its application to electronic voting
    • Crypto'99, of, Springer, Verlag, August
    • B. Schoenmakers. A simple publicly verifiable secret sharing scheme and its application to electronic voting. In Crypto'99, volume 1666 of LNCS, pages 148-164. Springer - Verlag, August 1999.
    • (1999) LNCS , vol.1666 , pp. 148-164
    • Schoenmakers, B.1
  • 33
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir. How to share a secret. Communication of the ACM, 22(11):612 - 613, November 1979.
    • (1979) Communication of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 35
    • 33845960920 scopus 로고    scopus 로고
    • Lattice-based threshold-changeability for standard Shamir secret-sharing schemes
    • Asiacrypt'04, of, Springer, Verlag, December
    • R. Steinfeld, H. Wang, and J. Pieprzyk. Lattice-based threshold-changeability for standard Shamir secret-sharing schemes. In Asiacrypt'04, volume 3329 of LNCS, pages 170 - 186. Springer - Verlag, December 2004.
    • (2004) LNCS , vol.3329 , pp. 170-186
    • Steinfeld, R.1    Wang, H.2    Pieprzyk, J.3
  • 38
    • 33845921100 scopus 로고    scopus 로고
    • C. Tang, Z. Liu, and M. Wang. A verifiable secret sharing scheme with statistical zero-knowledge. Avaliable onlne at: http://eprint.iacr.org/2003/222. pdf, October 2003.
    • C. Tang, Z. Liu, and M. Wang. A verifiable secret sharing scheme with statistical zero-knowledge. Avaliable onlne at: http://eprint.iacr.org/2003/222. pdf, October 2003.
  • 39
    • 33744941348 scopus 로고    scopus 로고
    • Efficient multicast stream authentication for the fully adversarial network
    • WISA 2005, of, Springer, Verlag, August
    • C. Tartary and H. Wang. Efficient multicast stream authentication for the fully adversarial network. In WISA 2005, volume 3786 of LNCS, pages 108 - 125. Springer - Verlag, August 2005.
    • (2005) LNCS , vol.3786 , pp. 108-125
    • Tartary, C.1    Wang, H.2
  • 40
    • 85008350180 scopus 로고
    • How to share a secret with cheaters
    • Crypto'86, of, Springer, Verlag, August
    • M. Tompa and H. Woll. How to share a secret with cheaters. In Crypto'86, volume 263 of LNCS, pages 261 - 265. Springer - Verlag, August 1986.
    • (1986) LNCS , vol.263 , pp. 261-265
    • Tompa, M.1    Woll, H.2
  • 41
    • 29244431868 scopus 로고    scopus 로고
    • Cheating immune secret sharing
    • ICICS 2001, of, Springer, Verlag, November
    • X. M. Zhang and J. Pieprzyk. Cheating immune secret sharing. In ICICS 2001, volume 2229 of LNCS, pages 144 - 149. Springer - Verlag, November 2001.
    • (2001) LNCS , vol.2229 , pp. 144-149
    • Zhang, X.M.1    Pieprzyk, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.