메뉴 건너뛰기




Volumn , Issue , 2007, Pages 227-237

Intrusion-resilient secret sharing

Author keywords

[No Author keywords available]

Indexed keywords

(MIN ,MAX ,+) FUNCTIONS; APPLIED (CO); COMMUNICATION COMPLEXITIES; IN ORDER; MALICIOUS SOFTWARE; RECONSTRUCTION PROCEDURE; RETRIEVAL MODELS; SECRET MESSAGES; SECRET SHARING; SECURITY PROOFS; SHORT MESSAGES; TOTAL AMOUNT;

EID: 46749096773     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2007.4389495     Document Type: Conference Paper
Times cited : (92)

References (26)
  • 4
    • 0013001552 scopus 로고    scopus 로고
    • Proactive security: Long-term protection against break-ins
    • R. Canetti, R. Gennaro, A. Herzberg, and D. Naor. Proactive security: Long-term protection against break-ins. RSA CryptoBytes, 3(1):1-8, 1997.
    • (1997) RSA CryptoBytes , vol.3 , Issue.1 , pp. 1-8
    • Canetti, R.1    Gennaro, R.2    Herzberg, A.3    Naor, D.4
  • 5
    • 38049016824 scopus 로고    scopus 로고
    • Intrusion-resilient key exchange in the bounded retrieval model
    • TCC07, of
    • D. Cash, Y. Z. Ding, Y. Dodis, W. Lee, R. J. Lipton, and S. Walfish. Intrusion-resilient key exchange in the bounded retrieval model. In TCC07, volume 4392 of LNCS, pages 479-498, 2007.
    • (2007) LNCS , vol.4392 , pp. 479-498
    • Cash, D.1    Ding, Y.Z.2    Dodis, Y.3    Lee, W.4    Lipton, R.J.5    Walfish, S.6
  • 7
    • 33745629609 scopus 로고    scopus 로고
    • Perfectly secure password protocols in the bounded retrieval model
    • TCC06, of
    • G. Di Crescenzo, R. J. Lipton, and S. Walfish. Perfectly secure password protocols in the bounded retrieval model. In TCC06, volume 3876 of LNCS, pages 225-244, 2006.
    • (2006) LNCS , vol.3876 , pp. 225-244
    • Di Crescenzo, G.1    Lipton, R.J.2    Walfish, S.3
  • 11
  • 12
    • 0023326390 scopus 로고
    • Lower bounds on communication complexity
    • P. Duris, Z. Galii, and G. Schnitger. Lower bounds on communication complexity. Inf. Comput., 73(1): 1-22, 1987.
    • (1987) Inf. Comput , vol.73 , Issue.1 , pp. 1-22
    • Duris, P.1    Galii, Z.2    Schnitger, G.3
  • 13
    • 33745532541 scopus 로고    scopus 로고
    • Intrusion-Resilience Via the Bounded-Storage Model
    • TCC'06, of, Springer
    • S. Dziembowski. Intrusion-Resilience Via the Bounded-Storage Model. In TCC'06, volume 3876 of LNCS, pages 207-224. Springer, 2006.
    • (2006) LNCS , vol.3876 , pp. 207-224
    • Dziembowski, S.1
  • 14
    • 33749583877 scopus 로고    scopus 로고
    • On Forward-Secure Storage
    • CRYPTO'06, of
    • S. Dziembowski. On Forward-Secure Storage. In CRYPTO'06, volume 4117 of LNCS, pages 251-270, 2006.
    • (2006) LNCS , vol.4117 , pp. 251-270
    • Dziembowski, S.1
  • 15
    • 4344699394 scopus 로고    scopus 로고
    • Optimal randomizer efficiency in the bounded-storage model
    • January
    • S. Dziembowski and U. Maurer. Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology, 17(1):5-26, January 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 5-26
    • Dziembowski, S.1    Maurer, U.2
  • 16
  • 17
    • 38749087238 scopus 로고    scopus 로고
    • On the compressibility of np instances and cryptographic applications
    • IEEE
    • D. Harnik and M. Naor. On the compressibility of np instances and cryptographic applications. In FOCS '06, pages 719-728. IEEE, 2006.
    • (2006) FOCS '06 , pp. 719-728
    • Harnik, D.1    Naor, M.2
  • 18
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • J. Hastad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput, 28(4): 1364-1396, 1999.
    • (1999) SIAM J. Comput , vol.28 , Issue.4 , pp. 1364-1396
    • Hastad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 19
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • U. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53-66, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 20
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion
    • U. Maurer. Secret key agreement by public discussion. IEEE Transactions on Information Theory, 39(3):733-742, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 21
    • 85031940329 scopus 로고
    • Rounds in communication complexity revisited
    • ACM
    • N. Nisan and A. Widgerson. Rounds in communication complexity revisited. In STOC '91, pages 419-429. ACM, 1991.
    • (1991) STOC '91 , pp. 419-429
    • Nisan, N.1    Widgerson, A.2
  • 22
    • 85012918897 scopus 로고
    • Communication complexity
    • ACM
    • C. H. Papadimitriou and M. Sipser. Communication complexity. In STOC, pages 196-200. ACM, 1982.
    • (1982) STOC , pp. 196-200
    • Papadimitriou, C.H.1    Sipser, M.2
  • 23
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir. How to share a secret. Communications of the ACM, 22:612-613, November 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 24
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptosystems in the bounded-storage model
    • January
    • S. P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology, 17(1):43-77, January 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1
  • 25
    • 0001998264 scopus 로고
    • Conjugate coding
    • S. Wiesner. Conjugate coding. SIGACT News, 15(1):78-88, 1983.
    • (1983) SIGACT News , vol.15 , Issue.1 , pp. 78-88
    • Wiesner, S.1
  • 26
    • 85039623622 scopus 로고
    • Some complexity questions related to distributive computing (preliminary report)
    • ACM
    • A. Chi-Chih Yao. Some complexity questions related to distributive computing (preliminary report). In STOC '79, pages 209-213. ACM, 1979.
    • (1979) STOC '79 , pp. 209-213
    • Chi-Chih Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.