메뉴 건너뛰기




Volumn 5677 LNCS, Issue , 2009, Pages 487-504

The round complexity of verifiable secret sharing revisited

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEXITY MEASURES; INTERACTIVE PROTOCOLS; LOWER AND UPPER BOUNDS; LOWER BOUNDS; PROBABILITY OF ERRORS; VERIFIABLE SECRET SHARING;

EID: 70350348919     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03356-8_29     Document Type: Conference Paper
Times cited : (51)

References (20)
  • 1
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In: STOC, pp. 1-10 (1988)
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 2
    • 84898947315 scopus 로고
    • Multiparty Unconditionally Secure Protocols
    • Chaum, D., Crpeau, C., Damgåard, I.: Multiparty Unconditionally Secure Protocols. In: FOCS, pp. 11-19 (1988)
    • (1988) FOCS , pp. 11-19
    • Chaum, D.1    Crpeau, C.2    Damgåard, I.3
  • 3
    • 0022199386 scopus 로고
    • Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults
    • Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. In: STOC, pp. 383-395 (1985)
    • (1985) STOC , pp. 383-395
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 4
    • 0033706246 scopus 로고    scopus 로고
    • On the Complexity of Verifiable Secret Sharing and Multiparty Computation
    • Cramer, R., Damgård, I., Dziembowski, S.: On the Complexity of Verifiable Secret Sharing and Multiparty Computation. In: STOC, pp. 325-334 (2000)
    • (2000) STOC , pp. 325-334
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3
  • 5
    • 84957717648 scopus 로고    scopus 로고
    • Efficient Multiparty Computations Secure Against an Adaptive Adversary
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient Multiparty Computations Secure Against an Adaptive Adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 6
    • 84948975649 scopus 로고    scopus 로고
    • General Secure Multi-Party Computation from Any Linear Secret-Sharing Scheme
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Cramer, R., Damgård, I., Maurer, U.M.: General Secure Multi-Party Computation from Any Linear Secret-Sharing Scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316-334. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 316-334
    • Cramer, R.1    Damgård, I.2    Maurer, U.M.3
  • 7
    • 0027341860 scopus 로고
    • Perfectly Secure Message Transmission
    • Dolev, D., Dwork, C., Waarts, O., Yung, M.: Perfectly Secure Message Transmission. JACM 40(1), 17-47 (1993)
    • (1993) JACM , vol.40 , Issue.1 , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 8
    • 70350293006 scopus 로고    scopus 로고
    • Dwork, C.: Strong Verifiable Secret Sharing. In: van Leeuwen, J., Santoro, N. (eds.) WDAG 1990. LNCS, 486, pp. 213-227. Springer, Heidelberg (1990)
    • Dwork, C.: Strong Verifiable Secret Sharing. In: van Leeuwen, J., Santoro, N. (eds.) WDAG 1990. LNCS, vol. 486, pp. 213-227. Springer, Heidelberg (1990)
  • 9
    • 0023538330 scopus 로고
    • A Practical Scheme for Non-Interactive Verifiable Secret Sharing
    • Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In: FOCS, pp. 427-437 (1987)
    • (1987) FOCS , pp. 427-437
    • Feldman, P.1
  • 10
    • 33745550878 scopus 로고    scopus 로고
    • Fitzi, M., Garay, J., Gollakota, S., Pandu Rangan, C., Srinathan, K.: Round-Optimal and Efficient Verifiable Secret Sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 329-342. Springer, Heidelberg (2006)
    • Fitzi, M., Garay, J., Gollakota, S., Pandu Rangan, C., Srinathan, K.: Round-Optimal and Efficient Verifiable Secret Sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 329-342. Springer, Heidelberg (2006)
  • 11
    • 0034830283 scopus 로고    scopus 로고
    • The Round Complexity of Verifiable Secret Sharing and Secure Multicast
    • Gennaro, R., Ishai, Y., Kushilevitz, E., Rabin, T.: The Round Complexity of Verifiable Secret Sharing and Secure Multicast. In: STOC, pp. 580-589 (2001)
    • (2001) STOC , pp. 580-589
    • Gennaro, R.1    Ishai, Y.2    Kushilevitz, E.3    Rabin, T.4
  • 12
    • 0023545076 scopus 로고
    • How to Play a Mental Game- a Completeness Theorem for Protocols with Honest Majority
    • Golderich, O., Micali, S., Wigderson, A.: How to Play a Mental Game- a Completeness Theorem for Protocols with Honest Majority. In: STOC 1987, pp. 218-229 (1987)
    • (1987) STOC 1987 , pp. 218-229
    • Golderich, O.1    Micali, S.2    Wigderson, A.3
  • 14
    • 49049095073 scopus 로고    scopus 로고
    • J. Katz, C. Koo, and R. Kumaresan. Improving the Round Complexity of VSS in Point-to-Point Networks. Cryptology ePrint 2007/358; In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, 5126, pp. 499-510. Springer, Heidelberg (2008)
    • J. Katz, C. Koo, and R. Kumaresan. Improving the Round Complexity of VSS in Point-to-Point Networks. Cryptology ePrint 2007/358; In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 499-510. Springer, Heidelberg (2008)
  • 15
    • 70350276840 scopus 로고    scopus 로고
    • Patra, A., Choudhary, A., Rabin, T., Pandu Rangan, C.: The Round Complexity of Verifiable Secret Sharing Revisited. Cryptology ePrint 2008/172
    • Patra, A., Choudhary, A., Rabin, T., Pandu Rangan, C.: The Round Complexity of Verifiable Secret Sharing Revisited. Cryptology ePrint 2008/172
  • 16
    • 84982943258 scopus 로고
    • Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Pedersen, T.P.: Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 17
    • 0028542745 scopus 로고
    • Robust Sharing of Secrets When the Dealer is Honest or Cheating
    • Rabin, T.: Robust Sharing of Secrets When the Dealer is Honest or Cheating. J. ACM 41(6), 1089-1109 (1994)
    • (1994) J. ACM , vol.41 , Issue.6 , pp. 1089-1109
    • Rabin, T.1
  • 18
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
    • Rabin, T., Ben-Or, M.: Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. In: STOC, pp. 73-85 (1989)
    • (1989) STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 19
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Shamir, A.: How to Share a Secret. Comm. of the ACM 22(11), 612-613 (1979)
    • (1979) Comm. of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 20
    • 85008350180 scopus 로고
    • How to Share a Secret with Cheaters
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Tompa, M., Woll, H.: How to Share a Secret with Cheaters. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 261-265. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.263 , pp. 261-265
    • Tompa, M.1    Woll, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.