메뉴 건너뛰기




Volumn 4515 LNCS, Issue , 2007, Pages 448-465

Ideal multipartite secret sharing schemes

Author keywords

Discrete polymatroids; Ideal access structures; Ideal secret sharing schemes; Multipartite matroids; Multipartite secret sharing; Secret sharing

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; HIERARCHICAL SYSTEMS; INFORMATION RETRIEVAL; PROBLEM SOLVING;

EID: 38049112844     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72540-4_26     Document Type: Conference Paper
Times cited : (47)

References (37)
  • 1
    • 33745543756 scopus 로고    scopus 로고
    • Third Theory of Cryptography Conference, TCC 2006. Lecture Notes in Comput. Sci
    • 482-501
    • A. Beimel, N. Livne. On Matroids and Non-ideal Secret Sharing. Third Theory of Cryptography Conference, TCC 2006. Lecture Notes in Comput. Sci. 3876 (2006) 482-501.
    • (2006) , vol.3876
    • Beimel, A.1    Livne, N.2
  • 2
    • 24144494482 scopus 로고    scopus 로고
    • Second Theory of Cryptography Conference, TCC 2005. Lecture Notes in Comput. Sci
    • 600-619
    • A. Beimel, T. Tassa, E. Weinreb. Characterizing Ideal Weighted Threshold Secret Sharing. Second Theory of Cryptography Conference, TCC 2005. Lecture Notes in Comput. Sci. 3378 (2005) 600-619.
    • (2005) , vol.3378
    • Beimel, A.1    Tassa, T.2    Weinreb, E.3
  • 3
    • 85027202957 scopus 로고
    • Generalized secret sharing and monotone functions. Advances in Cryptology, CRYPTO'88
    • J. Benaloh, J. Leichter. Generalized secret sharing and monotone functions. Advances in Cryptology, CRYPTO'88. Lecture Notes in Comput. Sci. 403 (1990) 27-35.
    • (1990) Lecture Notes in Comput. Sci , vol.403 , pp. 27-35
    • Benaloh, J.1    Leichter, J.2
  • 4
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • G.R. Blakley. Safeguarding cryptographic keys. AFIPS Conference Proceedings. 48 (1979) 313-317.
    • (1979) AFIPS Conference Proceedings , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 6
    • 85028751599 scopus 로고
    • On the information rate of secret sharing schemes. Advances in Cryptology, CRYPTO'92
    • C Blundo, A. De Santis, L. Gargano, U. Vaccaro. On the information rate of secret sharing schemes. Advances in Cryptology, CRYPTO'92. Lecture Notes in Comput. Sci. 740 (1993) 148-167.
    • (1993) Lecture Notes in Comput. Sci , vol.740 , pp. 148-167
    • Blundo, C.1    De Santis, A.2    Gargano, L.3    Vaccaro, U.4
  • 8
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E.F. Brickell, D.M. Davenport. On the classification of ideal secret sharing schemes. J. Cryptology 4 (1991) 123-134.
    • (1991) J. Cryptology , vol.4 , pp. 123-134
    • Brickell, E.F.1    Davenport, D.M.2
  • 10
    • 38049122768 scopus 로고    scopus 로고
    • M.J. Collins. A Note on Ideal Tripartite Access Structures. Cryptology ePrint Archive, Report 2002/193, http://eprint.iacr.org/2002/193.
    • M.J. Collins. A Note on Ideal Tripartite Access Structures. Cryptology ePrint Archive, Report 2002/193, http://eprint.iacr.org/2002/193.
  • 11
    • 0001607361 scopus 로고    scopus 로고
    • The size of a share must be large
    • L. Csirmaz. The size of a share must be large. J. Cryptology 10 (1997) 223-231.
    • (1997) J. Cryptology , vol.10 , pp. 223-231
    • Csirmaz, L.1
  • 14
    • 0023543848 scopus 로고
    • Secret sharing scheme realizing any access structure
    • M. Ito, A. Saito, T. Nishizeki. Secret sharing scheme realizing any access structure. Proc. IEEE Globecom'87. (1987) 99-102.
    • (1987) Proc. IEEE Globecom'87 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 15
    • 0001652944 scopus 로고    scopus 로고
    • Perfect secret sharing schemes on five participants
    • W.-A. Jackson, K.M. Martin. Perfect secret sharing schemes on five participants. Des. Codes Cryptogr. 9 (1996) 267-286.
    • (1996) Des. Codes Cryptogr , vol.9 , pp. 267-286
    • Jackson, W.-A.1    Martin, K.M.2
  • 17
    • 0001530822 scopus 로고
    • A solution of the Shannon switching game
    • A. Lehman. A solution of the Shannon switching game. J. Soc. Indust. Appl. Math. 12 (1964) 687-725.
    • (1964) J. Soc. Indust. Appl. Math , vol.12 , pp. 687-725
    • Lehman, A.1
  • 18
    • 14644407439 scopus 로고    scopus 로고
    • Secret sharing schemes with three or four minimal qualified subsets
    • J. Martí-Farré, C. Padró. Secret sharing schemes with three or four minimal qualified subsets. Des. Codes Cryptogr. 34 (2005) 17-34.
    • (2005) Des. Codes Cryptogr , vol.34 , pp. 17-34
    • Martí-Farré, J.1    Padró, C.2
  • 19
    • 32144455532 scopus 로고    scopus 로고
    • Secret sharing schemes on access structures with intersection number equal to one
    • J. Martí-Farré, C. Padró. Secret sharing schemes on access structures with intersection number equal to one. Discrete Applied Mathematics 154 (2006) 552-563.
    • (2006) Discrete Applied Mathematics , vol.154 , pp. 552-563
    • Martí-Farré, J.1    Padró, C.2
  • 20
    • 33750012353 scopus 로고    scopus 로고
    • Fifth Conference on Security and Cryptography for Networks, SCN 2006, Lecture Notes in Comput. Sci
    • 201-215
    • J.Martí-Farré, C. Padró. Ideal secret sharing schemes whose minimal qualified subsets have at most three participants. Fifth Conference on Security and Cryptography for Networks, SCN 2006, Lecture Notes in Comput. Sci., 4116 (2006) 201-215.
    • (2006) , vol.4116
    • Martí-Farré, J.1    Padró, C.2
  • 21
    • 38049036249 scopus 로고    scopus 로고
    • Fourth IACR Theory of Cryptography Conference TCC 2007, Lecture Notes in Comput. Sci
    • 273-290
    • J. Martí-Farré, C. Padró. On Secret Sharing Schemes, Matroids and Polymatroids. Fourth IACR Theory of Cryptography Conference TCC 2007, Lecture Notes in Comput. Sci. 4392 (2007) 273-290.
    • (2007) , vol.4392
    • Martí-Farré, J.1    Padró, C.2
  • 22
    • 0345884729 scopus 로고    scopus 로고
    • Matroid representations by partitions
    • F. Matúš. Matroid representations by partitions. Discrete Math. 203 (1999) 169-194.
    • (1999) Discrete Math , vol.203 , pp. 169-194
    • Matúš, F.1
  • 24
    • 0041928150 scopus 로고    scopus 로고
    • A Representation of a Family of Secret Sharing Matroids
    • S.-L. Ng. A Representation of a Family of Secret Sharing Matroids. Des. Codes Cryptogr. 30 (2003) 5-19.
    • (2003) Des. Codes Cryptogr , vol.30 , pp. 5-19
    • Ng, S.-L.1
  • 25
    • 33645011748 scopus 로고    scopus 로고
    • Ideal secret sharing schemes with multipartite access structures
    • S.-L. Ng. Ideal secret sharing schemes with multipartite access structures. IEE Proc.-Commun. 153 (2006) 165-168.
    • (2006) IEE Proc.-Commun , vol.153 , pp. 165-168
    • Ng, S.-L.1
  • 26
    • 0035452614 scopus 로고    scopus 로고
    • On the composition of matroids and ideal secret sharing schemes
    • S.-L. Ng, M. Walker. On the composition of matroids and ideal secret sharing schemes. Des. Codes Cryptogr. 24 (2001) 49-67.
    • (2001) Des. Codes Cryptogr , vol.24 , pp. 49-67
    • Ng, S.-L.1    Walker, M.2
  • 27
    • 0004061262 scopus 로고
    • Oxford Science Publications. The Clarendon Press, Oxford University Press, New York
    • J.G. Oxley. Matroid theory. Oxford Science Publications. The Clarendon Press, Oxford University Press, New York, 1992.
    • (1992) Matroid theory
    • Oxley, J.G.1
  • 28
    • 0034315039 scopus 로고    scopus 로고
    • Secret sharing schemes with bipartite access structure
    • C. Padró, G. Sáez. Secret sharing schemes with bipartite access structure. IEEE Trans. Inform. Theory 46 (2000) 2596-2604.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 2596-2604
    • Padró, C.1    Sáez, G.2
  • 29
    • 0039935716 scopus 로고
    • A forbidden minor characterization of matroid ports
    • P.D. Seymour. A forbidden minor characterization of matroid ports. Quart. J. Math. Oxford Ser. 27 (1976) 407-413.
    • (1976) Quart. J. Math. Oxford Ser , vol.27 , pp. 407-413
    • Seymour, P.D.1
  • 30
    • 38249009286 scopus 로고
    • On secret-sharing matroids
    • P.D. Seymour. On secret-sharing matroids. J. Combin. Theory Ser. B, 56 (1992) pp. 69-73.
    • (1992) J. Combin. Theory Ser. B , vol.56 , pp. 69-73
    • Seymour, P.D.1
  • 31
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. of the ACM, 22 (1979) pp. 612-613.
    • (1979) Commun. of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 32
    • 84898132112 scopus 로고
    • How to (Really) Share a Secret. Advances in Cryptology CRYPTO'88
    • G. J. Simmons. How to (Really) Share a Secret. Advances in Cryptology CRYPTO'88, Lecture Notes in Comput. Sci. 403 (1990) 390-448.
    • (1990) Lecture Notes in Comput. Sci , vol.403 , pp. 390-448
    • Simmons, G.J.1
  • 34
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • D.R. Stinson. An explication of secret sharing schemes. Des. Codes Cryptogr. 2 (1992) 357-390.
    • (1992) Des. Codes Cryptogr , vol.2 , pp. 357-390
    • Stinson, D.R.1
  • 35
    • 35048827923 scopus 로고    scopus 로고
    • Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004- Lecture Notes in Comput. Sci
    • 473-490
    • T. Tassa. Hierarchical Threshold Secret Sharing. Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004- Lecture Notes in Comput. Sci. 2951 (2004) 473-490.
    • (2004) , vol.2951
    • Tassa, T.1
  • 36
    • 33746381973 scopus 로고    scopus 로고
    • 33rd International Colloquium on Automata, Languages and Programming, ICALP 2006 - Lecture Notes in Comput. Sci
    • 288-299
    • T. Tassa, N. Dyn. Multipartite Secret Sharing by Bivariate Interpolation. 33rd International Colloquium on Automata, Languages and Programming, ICALP 2006 - Lecture Notes in Comput. Sci. 4052 (2006) 288-299.
    • (2006) , vol.4052
    • Tassa, T.1    Dyn, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.