메뉴 건너뛰기




Volumn 4392 LNCS, Issue , 2007, Pages 253-272

Weakly-private secret sharing schemes

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; DATA STRUCTURES; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 38049002374     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70936-7_14     Document Type: Conference Paper
Times cited : (16)

References (50)
  • 2
    • 84957652167 scopus 로고
    • General short computational secret sharing schemes
    • EUROCRYPT '95, of
    • P. Beguin and A. Cresti. General short computational secret sharing schemes. In EUROCRYPT '95, vol. 921 of LNCS, pages 194-208. 1995.
    • (1995) LNCS , vol.921 , pp. 194-208
    • Beguin, P.1    Cresti, A.2
  • 4
    • 38049078172 scopus 로고    scopus 로고
    • On private computation in incomplete networks
    • A. Beimel. On private computation in incomplete networks. Distributed Computing, 2006.
    • (2006) Distributed Computing
    • Beimel, A.1
  • 5
    • 0029732650 scopus 로고    scopus 로고
    • Communication in key distribution schemes
    • A. Beimel and B. Chor. Communication in key distribution schemes. IEEE Trans. on Information Theory, 42(1):19-28, 1996.
    • (1996) IEEE Trans. on Information Theory , vol.42 , Issue.1 , pp. 19-28
    • Beimel, A.1    Chor, B.2
  • 6
    • 33644602159 scopus 로고    scopus 로고
    • On the power of nonlinear secret-sharing
    • A. Beimel and Y. Ishai. On the power of nonlinear secret-sharing. SIAM J. on Discrete Mathematics, 19(1):258-280, 2005.
    • (2005) SIAM J. on Discrete Mathematics , vol.19 , Issue.1 , pp. 258-280
    • Beimel, A.1    Ishai, Y.2
  • 7
    • 33745543756 scopus 로고    scopus 로고
    • On matroids and non-ideal secret sharing
    • TCC 2006, of
    • A. Beimel and N. Livne. On matroids and non-ideal secret sharing. In TCC 2006, vol. 3876 of LNCS, pages 482-501, 2006.
    • (2006) LNCS , vol.3876 , pp. 482-501
    • Beimel, A.1    Livne, N.2
  • 8
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computations
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computations. In Proc. of the 20th STOC, pages 1-10, 1988.
    • (1988) Proc. of the 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 9
    • 85027202957 scopus 로고
    • Generalized secret sharing and monotone functions
    • CRYPTO '88, of
    • J. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In CRYPTO '88, vol. 403 of LNCS, pages 27-35. 1990.
    • (1990) LNCS , vol.403 , pp. 27-35
    • Benaloh, J.1    Leichter, J.2
  • 16
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E. F. Brickell and D. M. Davenport. On the classification of ideal secret sharing schemes. J. of Cryptology, 4(73): 123-134, 1991.
    • (1991) J. of Cryptology , vol.4 , Issue.73 , pp. 123-134
    • Brickell, E.F.1    Davenport, D.M.2
  • 19
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • EUROCRYPT 2000, of
    • R. Cramer, I. Damgård, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In EUROCRYPT 2000, vol. 1807 of LNCS, pages 316-334. 2000.
    • (2000) LNCS , vol.1807 , pp. 316-334
    • Cramer, R.1    Damgård, I.2    Maurer, U.3
  • 20
    • 84948972864 scopus 로고
    • The size of a share must be large
    • EUROCRYPT '94, of
    • L. Csirmaz. The size of a share must be large. In EUROCRYPT '94, vol. 950 of LNCS, pages 13-22. 1995.
    • (1995) LNCS , vol.950 , pp. 13-22
    • Csirmaz, L.1
  • 21
    • 0001607361 scopus 로고    scopus 로고
    • Also in
    • Also in: J. of Cryptology, 10(4):223-231, 1997.
    • (1997) J. of Cryptology , vol.10 , Issue.4 , pp. 223-231
  • 22
    • 0004020725 scopus 로고    scopus 로고
    • The dealer's random bits in perfect secret sharing schemes
    • L. Csirmaz. The dealer's random bits in perfect secret sharing schemes. Studia Sci. Math. Hungar., 32(3-4):429-437, 1996.
    • (1996) Studia Sci. Math. Hungar , vol.32 , Issue.3-4 , pp. 429-437
    • Csirmaz, L.1
  • 23
    • 33745808735 scopus 로고    scopus 로고
    • Linear integer secret sharing and distributed exponentiation
    • PKC 2006, of
    • I. Damgård and R. Thorbek. Linear integer secret sharing and distributed exponentiation. In PKC 2006, vol. 3958 of LNCS, pages 75-90. 2006.
    • (2006) LNCS , vol.3958 , pp. 75-90
    • Damgård, I.1    Thorbek, R.2
  • 24
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • CRYPTO '91, of
    • Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In CRYPTO '91, vol. 576 of LNCS, pages 457-469. 1992.
    • (1992) LNCS , vol.576 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 25
    • 0001522694 scopus 로고
    • On the information rate of perfect secret sharing schemes
    • M. van Dijk. On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 6:143-169, 1995.
    • (1995) Designs, Codes and Cryptography , vol.6 , pp. 143-169
    • van Dijk, M.1
  • 26
    • 0003944144 scopus 로고    scopus 로고
    • A linear construction of secret sharing schemes
    • M. van Dijk. A linear construction of secret sharing schemes. Designs, Codes and Cryptography, 12(2):161-201, 1997.
    • (1997) Designs, Codes and Cryptography , vol.12 , Issue.2 , pp. 161-201
    • van Dijk, M.1
  • 27
    • 34547273527 scopus 로고    scopus 로고
    • Attribute based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute based encryption for fine-grained access control of encrypted data. In CCS 2006, 2006.
    • (2006) CCS 2006
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 28
    • 38049075076 scopus 로고    scopus 로고
    • Personal communication
    • Y. Ishai. Personal communication. 2006.
    • (2006)
    • Ishai, Y.1
  • 29
    • 0023543848 scopus 로고
    • Secret sharing schemes realizing general access structure
    • M. Ito, A. Saito, and T. Nishizeki. Secret sharing schemes realizing general access structure. In Proc. of Globecom 87, pages 99-102, 1987.
    • (1987) Proc. of Globecom , vol.87 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 33
    • 38048999285 scopus 로고
    • Private communication
    • J. Kilian and N. Nisan. Private communication, 1990.
    • (1990)
    • Kilian, J.1    Nisan, N.2
  • 34
    • 84867963255 scopus 로고    scopus 로고
    • On the bound for anonymous secret sharing schemes
    • W. Kishimoto, K. Okada, K. Kurosawa, and W. Ogata. On the bound for anonymous secret sharing schemes. Discrete Appl. Math., 121 (1-3):193-202, 2002.
    • (2002) Discrete Appl. Math , vol.121 , Issue.1-3 , pp. 193-202
    • Kishimoto, W.1    Okada, K.2    Kurosawa, K.3    Ogata, W.4
  • 35
    • 85028775022 scopus 로고
    • Secret sharing made short
    • CRYPTO '93, of
    • H. Krawczyk. Secret sharing made short. In CRYPTO '93, vol. 773 of LNCS, pages 136-146. 1994.
    • (1994) LNCS , vol.773 , pp. 136-146
    • Krawczyk, H.1
  • 36
    • 0042376701 scopus 로고    scopus 로고
    • Combinatorial lower bounds for secret sharing schemes
    • K. Kurosawa and K. Okada. Combinatorial lower bounds for secret sharing schemes. Inform. Process. Lett., 60(6):301-304, 1996.
    • (1996) Inform. Process. Lett , vol.60 , Issue.6 , pp. 301-304
    • Kurosawa, K.1    Okada, K.2
  • 37
    • 0002365530 scopus 로고
    • Privacy and communication complexity
    • E. Kushilevitz. Privacy and communication complexity. SIAM J. on Discrete Mathematics, 5(2):273-284, 1992.
    • (1992) SIAM J. on Discrete Mathematics , vol.5 , Issue.2 , pp. 273-284
    • Kushilevitz, E.1
  • 38
    • 0028514351 scopus 로고
    • On the hardness of approximating minimization problems
    • C. Lund and M. Yannakakis. On the hardness of approximating minimization problems. J. of the ACM, 41(5):960-981, 1994.
    • (1994) J. of the ACM , vol.41 , Issue.5 , pp. 960-981
    • Lund, C.1    Yannakakis, M.2
  • 39
    • 70350701639 scopus 로고    scopus 로고
    • On secret sharing schemes, matroids and polymartroids
    • Technical Report 2006/077, Cryptology ePrint Archive, 2006
    • J. Martí-Farré and C. Padró. On secret sharing schemes, matroids and polymartroids. Technical Report 2006/077, Cryptology ePrint Archive, 2006.
    • Martí-Farré, J.1    Padró, C.2
  • 40
    • 0037435792 scopus 로고    scopus 로고
    • A combinatorial characterization of regular anonymous perfect threshold schemes
    • Y. Miao. A combinatorial characterization of regular anonymous perfect threshold schemes. Inform. Process. Lett., 85(3):131-135, 2003.
    • (2003) Inform. Process. Lett , vol.85 , Issue.3 , pp. 131-135
    • Miao, Y.1
  • 42
    • 0034315039 scopus 로고    scopus 로고
    • Secret sharing schemes with bipartite access structure
    • C. Padró and G. Sáez. Secret sharing schemes with bipartite access structure. IEEE Trans. on Information Theory, 46:2596-2605, 2000.
    • (2000) IEEE Trans. on Information Theory , vol.46 , pp. 2596-2605
    • Padró, C.1    Sáez, G.2
  • 47
    • 0028323999 scopus 로고
    • Decomposition construction for secret sharing schemes
    • D. R. Stinson. Decomposition construction for secret sharing schemes. IEEE Trans. on Information Theory, 40(1):118-125, 1994.
    • (1994) IEEE Trans. on Information Theory , vol.40 , Issue.1 , pp. 118-125
    • Stinson, D.R.1
  • 49
    • 0346895377 scopus 로고    scopus 로고
    • On the power of computational secret sharing
    • Indocrypt 2003, of
    • V. Vinod, A. Narayanan, K. Srinathan, C. Pandu Rangan, and K. Kim. On the power of computational secret sharing. In Indocrypt 2003, vol. 2904 of LNCS, pages 162-176. 2003.
    • (2003) LNCS , vol.2904 , pp. 162-176
    • Vinod, V.1    Narayanan, A.2    Srinathan, K.3    Pandu Rangan, C.4    Kim, K.5
  • 50
    • 38049059012 scopus 로고
    • Unpublished manuscript, Presented at workshops
    • A. C. Yao. Unpublished manuscript, 1989. Presented at Oberwolfach and DIMACS workshops.
    • (1989) Oberwolfach and DIMACS
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.