메뉴 건너뛰기




Volumn 22, Issue 1, 2008, Pages 360-397

Characterizing ideal weighted threshold secret sharing

Author keywords

Hierarchical access structures; Ideal secret sharing; Matroids; Tripartite access structures

Indexed keywords

HIERARCHICAL ACCESS STRUCTURES; IDEAL SCHEMES; IDEAL SECRET SHARING; MATROIDS; SECRET SHARING SCHEMES; THRESHOLD ACCESS STRUCTURES; THRESHOLD SECRET SHARING; TRIPARTITE ACCESS STRUCTURES;

EID: 61849155741     PISSN: 08954801     EISSN: None     Source Type: Journal    
DOI: 10.1137/S0895480104445654     Document Type: Article
Times cited : (50)

References (36)
  • 1
    • 0028429265 scopus 로고
    • Universally ideal secret sharing schemes
    • A. BEIMEL AND B. CHOR, Universally ideal secret sharing schemes, IEEE Trans. Inform. Theory, 40 (1994), pp. 786-794.
    • (1994) IEEE Trans. Inform. Theory , vol.40 , pp. 786-794
    • BEIMEL, A.1    CHOR, B.2
  • 2
    • 27844491900 scopus 로고    scopus 로고
    • Monotone circuits for monotone weighted threshold functions
    • A. BEIMEL AND E. WEINREB, Monotone circuits for monotone weighted threshold functions, Inform. Process. Lett., 97 (2006), pp. 12-18.
    • (2006) Inform. Process. Lett , vol.97 , pp. 12-18
    • BEIMEL, A.1    WEINREB, E.2
  • 4
    • 85027202957 scopus 로고
    • Generalized secret sharing and monotone functions
    • Advances in Cryptology-CRYPTO '88, S. Goldwasser, ed, Springer-Verlag, New York
    • J. BENALOH AND J. LEICHTER, Generalized secret sharing and monotone functions, in Advances in Cryptology-CRYPTO '88, S. Goldwasser, ed., Lecture Notes in Comput. Sci. 403, Springer-Verlag, New York, 1990, pp. 27-35.
    • (1990) Lecture Notes in Comput. Sci , vol.403 , pp. 27-35
    • BENALOH, J.1    LEICHTER, J.2
  • 5
    • 85062838317 scopus 로고    scopus 로고
    • G. R. BLAKLEY, Safeguarding cryptographic keys, in Proceedings of the 1979 AFIPS National Computer Conference, R. E. Merwin, J. T. Zanca, and M. Smith, eds., 48 of AFIPS Conference proceedings, AFIPS (American Federation of Information Processing Societies) Press, 1979, pp. 313-317.
    • G. R. BLAKLEY, Safeguarding cryptographic keys, in Proceedings of the 1979 AFIPS National Computer Conference, R. E. Merwin, J. T. Zanca, and M. Smith, eds., vol. 48 of AFIPS Conference proceedings, AFIPS (American Federation of Information Processing Societies) Press, 1979, pp. 313-317.
  • 7
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E. F. BRICKELL AND D. M. DAVENPORT, On the classification of ideal secret sharing schemes, J. Cryptology, 4 (1991), pp. 123-134.
    • (1991) J. Cryptology , vol.4 , pp. 123-134
    • BRICKELL, E.F.1    DAVENPORT, D.M.2
  • 8
    • 0026992660 scopus 로고
    • Some improved bounds on the information rate of perfect secret sharing schemes
    • E. F. BRICKELL AND D. R. STINSON, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology, 5 (1992), pp. 153-166.
    • (1992) J. Cryptology , vol.5 , pp. 153-166
    • BRICKELL, E.F.1    STINSON, D.R.2
  • 11
    • 79959295128 scopus 로고    scopus 로고
    • A Note on Ideal Tripartite Access Structures
    • Technical Report 2002/193, Cryptology ePrint Archive, 2002, online at
    • M. J. COLLINS, A Note on Ideal Tripartite Access Structures, Technical Report 2002/193, Cryptology ePrint Archive, 2002, online at http://eprint.iacr.org/.
    • COLLINS, M.J.1
  • 12
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • B. Preneel, ed, Lecture Notes in Comput. Sci. 1807, Springer-Verlag, New York
    • R. CRAMER, I. DAMGÅRD, AND U. MAURER, General secure multi-party computation from any linear secret-sharing scheme, in Advances in Cryptology - EUROCRYPT 2000, B. Preneel, ed., Lecture Notes in Comput. Sci. 1807, Springer-Verlag, New York, 2000, pp. 316-334.
    • (2000) Advances in Cryptology - EUROCRYPT 2000 , pp. 316-334
    • CRAMER, R.1    DAMGÅRD, I.2    MAURER, U.3
  • 13
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • Advances in Cryptology-CRYPTO '91, J. Feigenbaum, ed, Springer-Verlag, New York
    • Y. DESMEDT AND Y. FRANKEL, Shared generation of authenticators and signatures, in Advances in Cryptology-CRYPTO '91, J. Feigenbaum, ed., Lecture Notes in Comput. Sci. 576, Springer-Verlag, New York, 1992, pp. 457-469.
    • (1992) Lecture Notes in Comput. Sci , vol.576 , pp. 457-469
    • DESMEDT, Y.1    FRANKEL, Y.2
  • 14
    • 38049112844 scopus 로고    scopus 로고
    • Ideal multipartite secret sharing schemes
    • Advances in Cryptology-EUROCRYPT 2007, M. Naor, ed, Springer-Verlag, New York
    • O. FARRAS, J. MARTÍ-FARRÉ, AND C. PADRÓ, Ideal multipartite secret sharing schemes, in Advances in Cryptology-EUROCRYPT 2007, M. Naor, ed., Lecture Notes in Comput. Sci. 4515, Springer-Verlag, New York, 2007, pp. 448-465.
    • (2007) Lecture Notes in Comput. Sci , vol.4515 , pp. 448-465
    • FARRAS, O.1    MARTÍ-FARRÉ, J.2    PADRÓ, C.3
  • 15
    • 33746366452 scopus 로고    scopus 로고
    • New Results on Multipartite Access Structures
    • Technical Report 2006/048, Cryptology ePrint Archive, 2006, online at
    • J. HERRANZ AND G. SÁEZ, New Results on Multipartite Access Structures, Technical Report 2006/048, Cryptology ePrint Archive, 2006, online at http://eprint.iacr.org/.
    • HERRANZ, J.1    SÁEZ, G.2
  • 17
    • 0013229183 scopus 로고    scopus 로고
    • Ideal secret sharing schemes with multiple secrets
    • W. JACKSON, K. M. MARTIN, AND C. M. O'KEEFE, Ideal secret sharing schemes with multiple secrets, J. Cryptology, 9 (1996), pp. 233-250.
    • (1996) J. Cryptology , vol.9 , pp. 233-250
    • JACKSON, W.1    MARTIN, K.M.2    O'KEEFE, C.M.3
  • 20
    • 32144455532 scopus 로고    scopus 로고
    • Secret sharing schemes on access structures with intersection number equal to one
    • J. MARTÍ-FARRÉ AND C. PADRÓ, Secret sharing schemes on access structures with intersection number equal to one, Discrete Appl. Math., 154 (2006), pp. 552-563.
    • (2006) Discrete Appl. Math , vol.154 , pp. 552-563
    • MARTÍ-FARRÉ, J.1    PADRÓ, C.2
  • 22
    • 0002885219 scopus 로고
    • New secret sharing schemes from old
    • K. M. MARTIN, New secret sharing schemes from old, J. Combin. Math. Combin. Comput., 14 (1993), pp. 65-77.
    • (1993) J. Combin. Math. Combin. Comput , vol.14 , pp. 65-77
    • MARTIN, K.M.1
  • 24
    • 0004061262 scopus 로고
    • Oxford University Press, London
    • J. G. OXLEY, Matroid Theory, Oxford University Press, London, 1992.
    • (1992) Matroid Theory
    • OXLEY, J.G.1
  • 25
    • 0034315039 scopus 로고    scopus 로고
    • Secret sharing schemes with bipartite access structure
    • C. PADRÓ AND G. SÁEZ, Secret sharing schemes with bipartite access structure, IEEE Trans. Inform. Theory, 46 (2000), pp. 2596-2605.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 2596-2605
    • PADRÓ, C.1    SÁEZ, G.2
  • 27
    • 38249009286 scopus 로고
    • On secret-sharing matroids
    • P. D. SEYMOUR, On secret-sharing matroids, J. Combin. Theory Ser. B, 56 (1992), pp. 69-73.
    • (1992) J. Combin. Theory Ser. B , vol.56 , pp. 69-73
    • SEYMOUR, P.D.1
  • 28
    • 0018545449 scopus 로고
    • HOW to share a secret
    • A. SHAMIR, HOW to share a secret, Comm. ACM, 22 (1979), pp. 612-613.
    • (1979) Comm. ACM , vol.22 , pp. 612-613
    • SHAMIR, A.1
  • 29
    • 84898132112 scopus 로고
    • HOW to (really) share a secret
    • Advances in Cryptology-CRYPTO '88, S. Goldwasser, ed, Springer-Verlag, New York
    • G. J. SIMMONS, HOW to (really) share a secret, in Advances in Cryptology-CRYPTO '88, S. Goldwasser, ed., Lecture Notes in Comput. Sci. 403, Springer-Verlag, New York, 1990, pp. 390-448.
    • (1990) Lecture Notes in Comput. Sci , vol.403 , pp. 390-448
    • SIMMONS, G.J.1
  • 30
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control and their application
    • Integrity, G. J. Simmons, ed, IEEE Press, Piscataway, NJ
    • G. J. SIMMONS, An introduction to shared secret and/or shared control and their application, in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, Piscataway, NJ, 1992, pp. 441-497.
    • (1992) Contemporary Cryptology, The Science of Information , pp. 441-497
    • SIMMONS, G.J.1
  • 33
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • D. R. STINSON, An explication of secret sharing schemes, Designs, Codes and Cryptography, 2 (1992), pp. 357-390.
    • (1992) Designs, Codes and Cryptography , vol.2 , pp. 357-390
    • STINSON, D.R.1
  • 34
    • 85028945826 scopus 로고
    • New general lower bounds on the information rate of secret sharing schemes
    • Advances in Cryptology-CRYPTO '92, E. F. Brickell, ed, Springer-Verlag, New York
    • D. R. STINSON, New general lower bounds on the information rate of secret sharing schemes, in Advances in Cryptology-CRYPTO '92, E. F. Brickell, ed., Lecture Notes in Comput. Sci. 740, Springer-Verlag, New York, 1993, pp. 168-182.
    • (1993) Lecture Notes in Comput. Sci , vol.740 , pp. 168-182
    • STINSON, D.R.1
  • 35
    • 33947522725 scopus 로고    scopus 로고
    • Hierarchical threshold secret sharing
    • T. TASSA, Hierarchical threshold secret sharing, J. Cryptology, 20 (2007), pp. 237-264.
    • (2007) J. Cryptology , vol.20 , pp. 237-264
    • TASSA, T.1
  • 36
    • 33746381973 scopus 로고    scopus 로고
    • Multipartite secret sharing by bivariate interpolation
    • Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, eds, Springer-Verlag, New York
    • T. TASSA AND N. DYN, Multipartite secret sharing by bivariate interpolation., in Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, eds., Lecture Notes in Comput. Sci. 4052, Springer-Verlag, New York, 2006, pp. 288-299.
    • (2006) Lecture Notes in Comput. Sci , vol.4052 , pp. 288-299
    • TASSA, T.1    DYN, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.