메뉴 건너뛰기




Volumn 20, Issue 1, 2006, Pages 79-95

Optimum secret sharing scheme secure against cheating

Author keywords

Balanced incomplete block design; Cheaters; Cryptography; Difference sets; Secret sharing schemes

Indexed keywords

COMPUTATION THEORY; OPTIMIZATION; PROBABILITY; PROBLEM SOLVING; SET THEORY;

EID: 33847657638     PISSN: 08954801     EISSN: None     Source Type: Journal    
DOI: 10.1137/S0895480100378689     Document Type: Article
Times cited : (68)

References (24)
  • 3
    • 0005167951 scopus 로고
    • The detection of cheaters in threshold schemes
    • E. F. BRICKELL AND D. R. STINSON, The detection of cheaters in threshold schemes, SIAM J. Discrete Math., 4 (1991), pp. 502-510.
    • (1991) SIAM J. Discrete Math , vol.4 , pp. 502-510
    • BRICKELL, E.F.1    STINSON, D.R.2
  • 4
    • 0001476931 scopus 로고
    • A perfect threshold secret sharing scheme to identify cheaters
    • M. CARPENTIERI, A perfect threshold secret sharing scheme to identify cheaters, Des., Codes Cryptogr., 5 (1995), pp. 183-187.
    • (1995) Des., Codes Cryptogr , vol.5 , pp. 183-187
    • CARPENTIERI, M.1
  • 5
    • 85028775273 scopus 로고
    • Size of shares and probability of cheating in threshold schemes
    • Advances in Cryptography, Eurocrypt '93, Springer-Verlag, New York
    • M. CARPENTIERI, A. DE SANTIS, AND U. VACCARO, Size of shares and probability of cheating in threshold schemes, in Advances in Cryptography - Eurocrypt '93, Lecture Notes in Comput. Sci. 765, Springer-Verlag, New York, 1994, pp. 118-125.
    • (1994) Lecture Notes in Comput. Sci , vol.765 , pp. 118-125
    • CARPENTIERI, M.1    DE SANTIS, A.2    VACCARO, U.3
  • 9
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • Lecture Notes in Comput. Sci. 1807, Springer-Verlag, New York
    • R. CRAMER, I. DAMGÅRD, AND U. M. MAURER, General secure multi-party computation from any linear secret-sharing scheme, in Advances in Cryptography - Eurocrypt '00, Lecture Notes in Comput. Sci. 1807, Springer-Verlag, New York, 2000, pp. 316-334.
    • (2000) Advances in Cryptography - Eurocrypt '00 , pp. 316-334
    • CRAMER, R.1    DAMGÅRD, I.2    MAURER, U.M.3
  • 10
    • 33845925223 scopus 로고    scopus 로고
    • Error correcting and complexity aspects of linear secret sharing schemes
    • Information Security: 6th International Conference, ISO, Springer-Verlag, New York
    • Y. DESMEDT, K. KUROSAWA, AND T. V. LE, Error correcting and complexity aspects of linear secret sharing schemes, in Information Security: 6th International Conference, ISO 2003, Lecture Notes in Comput. Sci. 2851, Springer-Verlag, New York, 2003, pp. 396-407.
    • (2003) Lecture Notes in Comput. Sci , vol.2851 , pp. 396-407
    • DESMEDT, Y.1    KUROSAWA, K.2    LE, T.V.3
  • 12
    • 0027289776 scopus 로고
    • Multiple assignment scheme for sharing secret
    • M. ITO, A. SAITO, AND T. NISHIZEKI, Multiple assignment scheme for sharing secret, J. Cryptology, 6 (1993), pp. 15-20.
    • (1993) J. Cryptology , vol.6 , pp. 15-20
    • ITO, M.1    SAITO, A.2    NISHIZEKI, T.3
  • 14
    • 84957630266 scopus 로고
    • t-cheater identifiable (k, n) threshold secret sharing schemes
    • Advances in Cryptography, Crypto '95, Springer-Verlag, New York
    • K. KUROSAWA, S. OBANA, AND W. OGATA, t-cheater identifiable (k, n) threshold secret sharing schemes, in Advances in Cryptography - Crypto '95, Lecture Notes in Comput. Sci. 963, Springer-Verlag, New York, 1995, pp. 410-423.
    • (1995) Lecture Notes in Comput. Sci , vol.963 , pp. 410-423
    • KUROSAWA, K.1    OBANA, S.2    OGATA, W.3
  • 16
    • 0019608784 scopus 로고
    • On sharing secrets and Reed-Solomon codes
    • R. J. MCELIECE AND D. V. SARWATE, On sharing secrets and Reed-Solomon codes, Comm. ACM, 24 (1981), pp. 583-584.
    • (1981) Comm. ACM , vol.24 , pp. 583-584
    • MCELIECE, R.J.1    SARWATE, D.V.2
  • 17
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Advances in Cryptography, Crypto '91, Springer-Verlag, New York
    • T. PEDERSEN, Non-interactive and information-theoretic secure verifiable secret sharing, in Advances in Cryptography - Crypto '91, Lecture Notes in Comput. Sci. 576, Springer-Verlag, New York, 1991, pp. 129-149.
    • (1991) Lecture Notes in Comput. Sci , vol.576 , pp. 129-149
    • PEDERSEN, T.1
  • 19
    • 0039527186 scopus 로고    scopus 로고
    • An application of covering designs: Determining the maximum consistent set of shares in a threshold scheme
    • R. REES, D. R. STINSON, R. WEI, AND G. H. J. VAN REES, An application of covering designs: Determining the maximum consistent set of shares in a threshold scheme, Ars Combin., 53 (1999), pp. 225-237.
    • (1999) Ars Combin , vol.53 , pp. 225-237
    • REES, R.1    STINSON, D.R.2    WEI, R.3    VAN REES, G.H.J.4
  • 20
    • 0018545449 scopus 로고
    • How to share a secret
    • A. SHAMIR, How to share a secret, Comm. ACM, 22 (1979), pp. 612-613.
    • (1979) Comm. ACM , vol.22 , pp. 612-613
    • SHAMIR, A.1
  • 23
    • 0024141971 scopus 로고
    • How to share a secret with cheaters
    • M. TOMPA AND H. WOLL, How to share a secret with cheaters, J. Cryptology, 1 (1988), pp. 133-138.
    • (1988) J. Cryptology , vol.1 , pp. 133-138
    • TOMPA, M.1    WOLL, H.2
  • 24
    • 33847646839 scopus 로고    scopus 로고
    • A new algorithm for searching a consistent set of shares in a threshold scheme with cheaters
    • Information Security and Cryptology, ICISC 2003, Springer-Verlag, New York
    • R. TSO, Y. MIAO, AND E. OKAMOTO, A new algorithm for searching a consistent set of shares in a threshold scheme with cheaters, in Information Security and Cryptology - ICISC 2003, Lecture Notes in Comput. Sci. 2971, Springer-Verlag, New York, 2004, pp. 377-385.
    • (2004) Lecture Notes in Comput. Sci , vol.2971 , pp. 377-385
    • TSO, R.1    MIAO, Y.2    OKAMOTO, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.