-
1
-
-
77952350145
-
General short computational secret sharing schemes
-
P. Béguin and A. Cresti. General short computational secret sharing schemes. Eurocrypt '95.
-
Eurocrypt '95
-
-
Béguin, P.1
Cresti, A.2
-
2
-
-
0028429265
-
Universally ideal secret sharing schemes
-
A. Beimel and B. Chor. Universally ideal secret sharing schemes. IEEE Trans. on Info. Theory, 40 (3):786-794, 1994.
-
(1994)
IEEE Trans. on Info. Theory
, vol.40
, Issue.3
, pp. 786-794
-
-
Beimel, A.1
Chor, B.2
-
4
-
-
77952340819
-
The security of triple encryption and a framework for code-based game-playing proofs
-
M. Bellare and P. Rogaway. The security of triple encryption and a framework for code-based game-playing proofs. Eurocrypt '06.
-
Eurocrypt '06
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0005343811
-
Collision-resistant hashing: Towards making UOWHFs practical
-
M. Bellare and P. Rogaway. Collision-resistant hashing: towards making UOWHFs practical. Crypto '97.
-
Crypto '97
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. ACM CCS, 1993.
-
(1993)
ACM CCS
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
77952369914
-
Robust computational secret sharing and a unified account of classical secret-sharing goals. Full version of this paper
-
M. Bellare and P. Rogaway. Robust computational secret sharing and a unified account of classical secret-sharing goals. Full version of this paper. Cryptology ePrint Report 2006/449, 2006.
-
(2006)
Cryptology EPrint Report 2006/449
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
0001917195
-
Generalized secret sharing and monotone functions
-
J. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. Crypto '88.
-
Crypto '88
-
-
Benaloh, J.1
Leichter, J.2
-
9
-
-
85062838317
-
Safeguarding cryptographic keys
-
G. Blakley. Safeguarding cryptographic keys. AFIPS National Computer Conference, vol. 48, pp. 313-317, 1979.
-
(1979)
AFIPS National Computer Conference
, vol.48
, pp. 313-317
-
-
Blakley, G.1
-
10
-
-
0025056443
-
A discrete logarithm implementation of perfect zero-knowledge blobs
-
J. Boyar, S. Kurtz, and M. Krentel. A discrete logarithm implementation of perfect zero-knowledge blobs. J. of Cryptology, 2 (2), pp. 63-76, 1990.
-
(1990)
J. of Cryptology
, vol.2
, Issue.2
, pp. 63-76
-
-
Boyar, J.1
Kurtz, S.2
Krentel, M.3
-
11
-
-
0005167951
-
The detection of cheaters in threshold schemes
-
E. Brickell and D. Stinson. The detection of cheaters in threshold schemes. SIAM J. of Discrete Math, 4 (4):502-510, 1991.
-
(1991)
SIAM J. of Discrete Math.
, vol.4
, Issue.4
, pp. 502-510
-
-
Brickell, E.1
Stinson, D.2
-
12
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
E. Brickell and D. Stinson. Some improved bounds on the information rate of perfect secret sharing schemes. J. of Crypt, 5:153-166, 1992.
-
(1992)
J. of Crypt
, vol.5
, pp. 153-166
-
-
Brickell, E.1
Stinson, D.2
-
14
-
-
0027607213
-
On the size of shares for secret sharing schemes
-
R. Capocelli, A. DeSantis, L. Gargano, and U. Vaccaro. On the size of shares for secret sharing schemes. J. of Cryptology, 6:157-167, 1993.
-
(1993)
J. of Cryptology
, vol.6
, pp. 157-167
-
-
Capocelli, R.1
DeSantis, A.2
Gargano, L.3
Vaccaro, U.4
-
16
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbach. Verifiable secret sharing and achieving simultaneity in the presence of faults. FOCS '85.
-
FOCS '85
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbach, B.4
-
17
-
-
33745545274
-
On the existence of statistically hiding bit commitment schemes and fail-stop signatures
-
I. Damgård, T. Pedersen, and B. Pfitzmann. On the existence of statistically hiding bit commitment schemes and fail-stop signatures. J. of Cryptology, 10 (3), pp. 163-194, 1997.
-
(1997)
J. of Cryptology
, vol.10
, Issue.3
, pp. 163-194
-
-
Damgård, I.1
Pedersen, T.2
Pfitzmann, B.3
-
18
-
-
4243148483
-
Magic functions
-
C. Dwork, M. Naor, O. Reingold, and L. Stockmeyer. Magic functions. JACM, 50 (6), pp. 852-921, 2003.
-
(2003)
JACM
, vol.50
, Issue.6
, pp. 852-921
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Stockmeyer, L.4
-
19
-
-
0023538330
-
A practical scheme for non-interactive verifiable secret sharing
-
P. Feldman. A practical scheme for non-interactive verifiable secret sharing. FOCS '87.
-
FOCS '87
-
-
Feldman, P.1
-
20
-
-
84964528983
-
Survivable storage systems
-
IEEE Press
-
G. Ganger, P. Khosla, M. Bakkaloglu, M. Bigrigg, G. Goodson, S. Oguz, V. Pandurangan, C. Soules, J. Strunk, and J. Wylie. Survivable storage systems. DARPA Information Survivability Conference and Exposition, vol. 2, IEEE Press, pp. 184-195, 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 184-195
-
-
Ganger, G.1
Khosla, P.2
Bakkaloglu, M.3
Bigrigg, M.4
Goodson, G.5
Oguz, S.6
Pandurangan, V.7
Soules, C.8
Strunk, J.9
Wylie, J.10
-
21
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali. Probabilistic encryption. JCSS, 28 (2):270-299, 1984.
-
(1984)
JCSS
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
22
-
-
77952355055
-
Practical and provably-secure commitment schemes from collision-free hashing
-
S. Halevi and S. Micali. Practical and provably-secure commitment schemes from collision-free hashing. Crypto '96.
-
Crypto '96
-
-
Halevi, S.1
Micali, S.2
-
26
-
-
0023543848
-
Secret sharing schemes realizing general access structure
-
M. Ito, A. Saito, and T. Nishizeki. Secret sharing schemes realizing general access structure. IEEE Globecom 87, pp. 99-102, 1987.
-
(1987)
IEEE Globecom
, vol.87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
27
-
-
0011841706
-
Design and implementation of a secure distributed data repository
-
A. Iyengar, R. Cahn, C. Jutla, and J. Garay. Design and implementation of a secure distributed data repository. 14th IFIP International Information Security Conference, pp. 123-135, 1998.
-
(1998)
14th IFIP International Information Security Conference
, pp. 123-135
-
-
Iyengar, A.1
Cahn, R.2
Jutla, C.3
Garay, J.4
-
29
-
-
0020543282
-
On secret sharing systems
-
E. Karnin, J. Greene, and M. Hellman. On secret sharing systems. IEEE Trans. on Inf. Theory, 29 (1):35-51, 1983.
-
(1983)
IEEE Trans. on Inf. Theory
, vol.29
, Issue.1
, pp. 35-51
-
-
Karnin, E.1
Greene, J.2
Hellman, M.3
-
31
-
-
0027838927
-
Distributed fingerprints and secure information dispersal
-
H. Krawczyk. Distributed fingerprints and secure information dispersal. PODC 1993.
-
(1993)
PODC
-
-
Krawczyk, H.1
-
32
-
-
0142103245
-
Responsive security for stored data
-
S. Lakshmanan, M. Ahamad, and H. Venkateswaran. Responsive security for stored data. IEEE Trans. on Parallel and Distributed Systems, 14 (9):818-828, 2003.
-
(2003)
IEEE Trans. on Parallel and Distributed Systems
, vol.14
, Issue.9
, pp. 818-828
-
-
Lakshmanan, S.1
Ahamad, M.2
Venkateswaran, H.3
-
33
-
-
0031342290
-
Generalized secret sharing and group-key distribution using short keys
-
IEEE Press
-
A. Mayer and M. Yung. Generalized secret sharing and group-key distribution using short keys. Compression and Complexity of Sequences 1997, IEEE Press, pp. 30-44, 1997.
-
(1997)
Compression and Complexity of Sequences 1997
, pp. 30-44
-
-
Mayer, A.1
Yung, M.2
-
34
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
R. McEliece and D. Sarwate. On sharing secrets and Reed-Solomon codes. CACM 24:583-584, 1981.
-
(1981)
CACM
, vol.24
, pp. 583-584
-
-
McEliece, R.1
Sarwate, D.2
-
35
-
-
0141544069
-
Perfect zero-knowledge arguments for NP using any one-way permutation
-
M. Naor, R. Ostrovsky, R. Venkatesan, and M. Yung. Perfect zero-knowledge arguments for NP using any one-way permutation. J. of Crypt. 11 (2):87-108, 1998.
-
(1998)
J. of Crypt
, vol.11
, Issue.2
, pp. 87-108
-
-
Naor, M.1
Ostrovsky, R.2
Venkatesan, R.3
Yung, M.4
-
36
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. STOC 1989.
-
(1989)
STOC
-
-
Naor, M.1
Yung, M.2
-
38
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. JACM 36 (2):335-348, 1989.
-
(1989)
JACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.1
-
39
-
-
85031315362
-
Verifiable secret sharing and multiparty protocols with honest majority
-
T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. STOC 89.
-
STOC 89
-
-
Rabin, T.1
Ben-Or, M.2
-
40
-
-
84945140078
-
One-way functions are necessary and sufficient for secure signatures
-
J. Rompel. One-way functions are necessary and sufficient for secure signatures. STOC '90.
-
STOC '90
-
-
Rompel, J.1
-
41
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. CACM 22 (11):612-613, 1979.
-
(1979)
CACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
42
-
-
84856043672
-
A mathematical theory of communication
-
pp. 623-656, July and October
-
C. Shannon. A mathematical theory of communication. Bell System Technical Journal, vol. 27, pp. 379-423 and pp. 623-656, July and October, 1948.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.1
-
43
-
-
0000708528
-
An explication of secret sharing schemes
-
Kluwer
-
D. Stinson. An explication of secret sharing schemes. Designs, Codes and Cryptography, 2:357-390, Kluwer, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 357-390
-
-
Stinson, D.1
-
44
-
-
0024141971
-
How to share a secret with cheaters
-
M. Tompa and H. Woll. How to share a secret with cheaters. J. of Crypt. 1:133-138, 1988.
-
(1988)
J. of Crypt
, vol.1
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
-
46
-
-
84979203636
-
The architecture of robust publishing systems
-
M. Waldman, A. Rubin, and L. Cranor. The architecture of robust publishing systems. ACM Trans. on Internet Technology, 1 (2):199-230, 2001.
-
(2001)
ACM Trans. on Internet Technology
, vol.1
, Issue.2
, pp. 199-230
-
-
Waldman, M.1
Rubin, A.2
Cranor, L.3
-
47
-
-
0001467577
-
The zero-error side information problem and chromatic numbers
-
H. Witsenhausen. The zero-error side information problem and chromatic numbers. IEEE Transactions on Information Theory, vol. 22, no. 5, pp. 592-593, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.5
, pp. 592-593
-
-
Witsenhausen, H.1
-
48
-
-
0342410321
-
Survivable information storage systems
-
J. Wylie, M. Bigrigg, J. Strunk, G. Ganger, H. Kiliçć Löte, and P. Khosla. Survivable information storage systems. IEEE Computer 33 (8):61-68, 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.8
, pp. 61-68
-
-
Wylie, J.1
Bigrigg, M.2
Strunk, J.3
Ganger, G.4
Kiliçćlöte, H.5
Khosla, P.6
|