메뉴 건너뛰기




Volumn 4284 LNCS, Issue , 2006, Pages 364-379

Almost optimum secret sharing schemes secure against cheating for arbitrary secret distribution

Author keywords

[No Author keywords available]

Indexed keywords

LOWER BOUNDS; NOVEL TECHNIQUES; SECRET RECONSTRUCTION; SECRET SHARING SCHEMES; UNIVERSAL HASH FUNCTION;

EID: 38149036127     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935230_24     Document Type: Conference Paper
Times cited : (32)

References (12)
  • 1
    • 77649247421 scopus 로고    scopus 로고
    • G. R. Blakley, Safeguarding cryptographic keys, Proc. AFIPS 1979, National Computer Conference, 48, pp. 313-137, 1979. 4, no. 4, pp. 502-510, 1991.
    • G. R. Blakley, "Safeguarding cryptographic keys," Proc. AFIPS 1979, National Computer Conference, vol. 48, pp. 313-137, 1979. vol. 4, no. 4, pp. 502-510, 1991.
  • 2
    • 0001476931 scopus 로고
    • A Perfect Threshold Secret Sharing Scheme to Identify Cheaters
    • M. Carpentieri, "A Perfect Threshold Secret Sharing Scheme to Identify Cheaters," Designs, Codes and Cryptography, vol. 5, no. 3, pp. 183-187, 1995.
    • (1995) Designs, Codes and Cryptography , vol.5 , Issue.3 , pp. 183-187
    • Carpentieri, M.1
  • 3
    • 85028775273 scopus 로고
    • Size of Shares and Probability of Cheating in Threshold Schemes
    • Proc. Eurocrypt'93, 765, Springer Verlag, pp
    • M. Carpentieri, A. De Santis and U. Vaccaro, "Size of Shares and Probability of Cheating in Threshold Schemes," Proc. Eurocrypt'93, Lecture Notes in Computer Science, vol. 765, Springer Verlag, pp. 118-125, 1993.
    • (1993) Lecture Notes in Computer Science , pp. 118-125
    • Carpentieri, M.1    De Santis, A.2    Vaccaro, U.3
  • 4
    • 84948975649 scopus 로고    scopus 로고
    • R. Cramer, I. Damg?ard and U. M. Maurer, General Secure Multi-party Computation from any Linear Secret-Sharing Scheme, Proc. Eurocrypt'00, Lecture Notes in Computer Science, 1807, Springer Verlag, pp. 316-334, 2000.
    • R. Cramer, I. Damg?ard and U. M. Maurer, "General Secure Multi-party Computation from any Linear Secret-Sharing Scheme," Proc. Eurocrypt'00, Lecture Notes in Computer Science, vol. 1807, Springer Verlag, pp. 316-334, 2000.
  • 5
    • 0013259203 scopus 로고
    • A Simple and Key-Economical Unconditional Authentication Scheme
    • B. den Boer, "A Simple and Key-Economical Unconditional Authentication Scheme," Journal of Computer Security, vol. 2, pp. 65-71, 1993.
    • (1993) Journal of Computer Security , vol.2 , pp. 65-71
    • den Boer, B.1
  • 6
    • 84957630266 scopus 로고    scopus 로고
    • K. Kurosawa, S. Obana andW. Ogata, t-Cheater Identifiable (k, n) Secret Sharing Schemes, Proc. Crypto'95, Lecture Notes in Computer Science, 963, Springer Verlag, pp. 410-423, 1995.
    • K. Kurosawa, S. Obana andW. Ogata, "t-Cheater Identifiable (k, n) Secret Sharing Schemes," Proc. Crypto'95, Lecture Notes in Computer Science, vol. 963, Springer Verlag, pp. 410-423, 1995.
  • 9
    • 84982943258 scopus 로고
    • Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
    • Proc. Crypto'91, 576, Springer Verlag, pp
    • T. Pedersen, "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing," Proc. Crypto'91, Lecture Notes in Computer Science, vol 576, Springer Verlag, pp. 129-149, 1991.
    • (1991) Lecture Notes in Computer Science , pp. 129-149
    • Pedersen, T.1
  • 10
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 11
    • 0842305624 scopus 로고    scopus 로고
    • On the Connections between Universal Hashing, Combinatorial Designs and Error-Correcting Codes
    • D. R. Stinson, "On the Connections between Universal Hashing, Combinatorial Designs and Error-Correcting Codes," Congressus Numerantium 114, pp. 7-27, 1996.
    • (1996) Congressus Numerantium , vol.114 , pp. 7-27
    • Stinson, D.R.1
  • 12
    • 0024141971 scopus 로고
    • How to Share a Secret with Cheaters
    • M. Tompa and H. Woll, "How to Share a Secret with Cheaters," Journal of Cryptology, vol. 1, no. 3, pp. 133-138, 1989.
    • (1989) Journal of Cryptology , vol.1 , Issue.3 , pp. 133-138
    • Tompa, M.1    Woll, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.