메뉴 건너뛰기




Volumn 58, Issue , 2009, Pages 35-42

Shadow generation protocol in linguistic threshold schemes

Author keywords

Information management; Secret sharing; Threshold schemes

Indexed keywords

INFORMATION STRUCTURES; INPUT STRING; LINEAR CHARACTERISTICS; MANAGE INFORMATION; SECRET SHARING; SECRET SHARING ALGORITHM; SECRET-SPLITTING; SHARED SECRETS; THRESHOLD SCHEMES; USE CONTEXT;

EID: 73349136579     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-10847-1_5     Document Type: Conference Paper
Times cited : (32)

References (16)
  • 2
    • 84947751790 scopus 로고    scopus 로고
    • Constructions and bounds for visual cryptography
    • Meyer auf der Heide, F., Monien, B. (eds.) ICALP 1996. Springer, Heidelberg
    • Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer auf der Heide, F., Monien, B. (eds.) ICALP 1996. LNCS, vol.1099, pp. 416-428. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1099 , pp. 416-428
    • Ateniese, G.1    Blundo, C.2    De Santis, A.3    Stinson, D.R.4
  • 3
    • 84957652167 scopus 로고
    • General short computational secret sharing schemes
    • Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. Springer, Heidelberg
    • Beguin, P., Cresti, A.: General short computational secret sharing schemes. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.921, pp. 194-208. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.921 , pp. 194-208
    • Beguin, P.1    Cresti, A.2
  • 6
    • 85028918825 scopus 로고
    • Threshold schemes with disenrollment
    • Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
    • Blakley, B., Blakley, G.R., Chan, A.H., Massey, J.: Threshold schemes with disenrollment. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.740, pp. 540-548. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 540-548
    • Blakley, B.1    Blakley, G.R.2    Chan, A.H.3    Massey, J.4
  • 7
    • 0031222285 scopus 로고    scopus 로고
    • Lower bounds for robust secret sharing schemes
    • Blundo, C., De Santis, A.: Lower bounds for robust secret sharing schemes. Inform. Process. Lett. 63, 317-321 (1997)
    • (1997) Inform. Process. Lett. , vol.63 , pp. 317-321
    • Blundo, C.1    De Santis, A.2
  • 8
    • 67650640434 scopus 로고
    • Generalised cumulative arrays and their application to secret sharing schemes
    • Charnes, C., Pieprzyk, J.: Generalised cumulative arrays and their application to secret sharing schemes. Australian Computer Science Communications 17, 61-65 (1995)
    • (1995) Australian Computer Science Communications , vol.17 , pp. 61-65
    • Charnes, C.1    Pieprzyk, J.2
  • 9
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.435, pp. 307-315. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 10
    • 0001522694 scopus 로고
    • On the information rate of perfect secret sharing schemes
    • van Dijk, M.: On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography 6, 143-169 (1995)
    • (1995) Designs, Codes and Cryptography , vol.6 , pp. 143-169
    • Van Dijk, M.1
  • 11
    • 34247555884 scopus 로고    scopus 로고
    • Privacy-preserving data mining systems
    • Hang, N., Zhao, W.: Privacy-preserving data mining Systems. Computer 40(4), 52-58 (2007)
    • (2007) Computer , vol.40 , Issue.4 , pp. 52-58
    • Hang, N.1    Zhao, W.2
  • 13
    • 60349097094 scopus 로고    scopus 로고
    • Linguistic extension for secret sharing (m, n)-threshold schemes
    • Hainan Island, Sanya, China, December 13-15, ISBN: 978-0-7695-3486-2, doi:10.1109/SecTech.2008.15
    • Ogiela, M.R., Ogiela, U.: Linguistic Extension for Secret Sharing (m, n)-threshold Schemes. In: SecTech 2008 - 2008 International Conference on Security Technology, Hainan Island, Sanya, China, December 13-15, pp. 125-128 (2008), ISBN: 978-0-7695- 3486-2, doi:10.1109/SecTech.2008.15
    • (2008) SecTech 2008 - 2008 International Conference on Security Technology , pp. 125-128
    • Ogiela, M.R.1    Ogiela, U.2
  • 15
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control schemes and their application in contemporary cryptology
    • IEEE Press, Los Alamitos
    • Simmons, G.J.: An Introduction to Shared Secret and/or Shared Control Schemes and Their Application in Contemporary Cryptology. In: The Science of Information Integrity, pp. 441-497. IEEE Press, Los Alamitos (1992)
    • (1992) The Science of Information Integrity , pp. 441-497
    • Simmons, G.J.1
  • 16
    • 15944409593 scopus 로고    scopus 로고
    • Simple secret sharing and threshold RSA signature schemes
    • Tang, S.: Simple Secret Sharing and Threshold RSA Signature Schemes. Journal of Information and Computational Science 1, 259-262 (2004)
    • (2004) Journal of Information and Computational Science , vol.1 , pp. 259-262
    • Tang, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.