메뉴 건너뛰기




Volumn 4, Issue 4, 2009, Pages 201-209

A proactive secret sharing scheme in matrix projection method

Author keywords

Cryptography; Matrix projection; Pythagorean triples

Indexed keywords

CRYPTOGRAPHY; ELECTRICAL ENGINEERING; NETWORK SECURITY;

EID: 70349969846     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2009.028667     Document Type: Article
Times cited : (38)

References (15)
  • 2
    • 0032166974 scopus 로고    scopus 로고
    • Secret sharing with public reconstruction
    • Beimel, A. and Chor, B. (1998) 'Secret sharing with public reconstruction', IEEE Trans. Inform. Theory, Vol. 44, pp.1887-1896.
    • (1998) IEEE Trans. Inform. Theory , vol.44 , pp. 1887-1896
    • Beimel, A.1    Chor, B.2
  • 5
    • 0023538330 scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • 12-14 October, IEEE Computer Society, Los Angeles, California, pp
    • Feldman, P. (1987) 'A practical scheme for non-interactive verifiable secret sharing', Proceedings of the 28th IEEE Symposium on Foundations of Computer Science (FOCS' 87), 12-14 October, IEEE Computer Society, Los Angeles, California, pp.427-437.
    • (1987) Proceedings of the 28th IEEE Symposium on Foundations of Computer Science (FOCS' 87) , pp. 427-437
    • Feldman, P.1
  • 7
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • Don Coppersmith Ed, August, Santa Barbara, CA, pp
    • Herzberg, A., Jarecki, S., Krawczyk, H. and Yung, M. (1995) 'Proactive secret sharing or: How to cope with perpetual leakage', in Don Coppersmith (Ed.): Advances in Cryptology - Crypto '95, August, Santa Barbara, CA, pp.339-352.
    • (1995) Advances in Cryptology - Crypto '95 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 10
    • 33144466119 scopus 로고    scopus 로고
    • MDS secret-sharing scheme secure against cheaters
    • Okada, K. and Kurosawa, K. (2000) 'MDS secret-sharing scheme secure against cheaters', IEEE Trans. Inform. Theory, Vol. 46, pp.1078-1081.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 1078-1081
    • Okada, K.1    Kurosawa, K.2
  • 11
    • 84982943258 scopus 로고
    • Non-interactive and informationtheoretic secure verifiable secret sharing
    • Feigenbaum, J, Ed, Springer-Verlag, University of California in Santa Barbara, 11-15 August, pp
    • Pedersen, T.P. (1991) 'Non-interactive and informationtheoretic secure verifiable secret sharing', in Feigenbaum, J. (Ed.): Advances in Cryptology - Crypto'91, IACR, Springer-Verlag, University of California in Santa Barbara, 11-15 August, pp.129-140.
    • (1991) Advances in Cryptology - Crypto'91, IACR , pp. 129-140
    • Pedersen, T.P.1
  • 12
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A. (1979) 'How to share a secret', Communications of the ACM Vol. 22, pp.612-613.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 13
    • 0028323999 scopus 로고
    • Decomposition constructions for secret-sharing schemes
    • Stinson, D.R. (1994) 'Decomposition constructions for secret-sharing schemes', IEEE Trans. Inform. Theory, Vol. 40, pp.118-125.
    • (1994) IEEE Trans. Inform. Theory , vol.40 , pp. 118-125
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.