메뉴 건너뛰기




Volumn , Issue , 2010, Pages 745-752

Collusion attack resistance and practice-oriented threshold changeable secret sharing schemes

Author keywords

Collusion attack; Communication rate; Partial broadcast channel; Threshold changeable secret sharing scheme

Indexed keywords

COLLUSION ATTACK; COMMUNICATION RATE; LONG LIFE; ON-LINE SERVICE; PARTIAL BROADCAST; SECRET RECONSTRUCTION; SECRET SHARING; SECRET SHARING SCHEMES; SECURE CHANNELS; SECURITY ANALYSIS; SHARE DISTRIBUTION PHASE; SHARED SECRETS; THRESHOLD PARAMETERS; THRESHOLD SCHEMES; THRESHOLD SECRET SHARING;

EID: 77954323664     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2010.56     Document Type: Conference Paper
Times cited : (10)

References (18)
  • 1
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 6
    • 84958752925 scopus 로고    scopus 로고
    • Efficient and unconditionally secure verifiable threshold changeable scheme
    • Springer-Verlag, Sydney: Australia, vol 2119 of LNCS, July
    • A. Maeda, A. Miyaji, and M. Tada, Efficient and unconditionally secure verifiable threshold changeable scheme, in proceedings of ACISP(2001), Springer-Verlag, Sydney: Australia, vol 2119 of LNCS, pp. 402-416, July 2001.
    • (2001) Proceedings of ACISP(2001) , pp. 402-416
    • Maeda, A.1    Miyaji, A.2    Tada, M.3
  • 7
    • 33748413820 scopus 로고    scopus 로고
    • Secret sharing schemes with partial broadcast channels, manuscript
    • R. Safavi-Naini and H. Wang, Secret sharing schemes with partial broadcast channels, manuscript, Des. Codes Cryptography.,vol. 41,pp. 5-22, 2006.
    • (2006) Des. Codes Cryptography , vol.41 , pp. 5-22
    • Safavi-Naini, R.1    Wang, H.2
  • 8
    • 38349104231 scopus 로고    scopus 로고
    • On secret reconstruction in secret sharing schemes
    • H. Wang, Wang D. S, "On Secret Reconstruction in Secret Sharing Schemes," IEEE Trans, Inf. Theory, vol. 54, pp. 473-480,2008.
    • (2008) IEEE Trans, Inf. Theory , vol.54 , pp. 473-480
    • Wang, H.1    Wang, D.S.2
  • 9
    • 0022199386 scopus 로고
    • Verifiable secret sharing and achieving simultaneity in the presence of faults
    • B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in proceedings of FOCS(1985),pp. 383-395,1985.
    • (1985) Proceedings of FOCS(1985) , pp. 383-395
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 10
    • 0024141971 scopus 로고
    • How to share a secret with cheaters
    • M. Tompa and H. Woll, How to share a secret with cheaters, Journal of Cryptology, pp. 133-138, 1988.
    • (1988) Journal of Cryptology , pp. 133-138
    • Tompa, M.1    Woll, H.2
  • 11
    • 77954335302 scopus 로고    scopus 로고
    • Non-interactive and informationtheoretic secure publicly verifiable secret sharing
    • C. Tang, Z. Liu, and Y. He, Non-interactive and informationtheoretic secure publicly verifiable secret sharing, Cryptology ePrint Archive, Report 2004/201, 2004. http://eprint.iacr.org/.
    • (2004) Cryptology ePrint Archive, Report 2004/201
    • Tang, C.1    Liu, Z.2    He, Y.3
  • 12
    • 33845960920 scopus 로고    scopus 로고
    • Lattice-based threshold changeability for standard shamir secret-sharing schemes
    • Lncs
    • R. Steinfeld, H. Wang, and J. Pieprzyk, "Lattice-based threshold changeability for standard Shamir secret-sharing schemes," In Advances in Cryptology-Asiacrypt'04, Lncs, vol. 3329,pp. 170-186,2004.
    • (2004) Advances in Cryptology-Asiacrypt'04 , vol.3329 , pp. 170-186
    • Steinfeld, R.1    Wang, H.2    Pieprzyk, J.3
  • 13
    • 33845927130 scopus 로고    scopus 로고
    • Dynamic threshold and cheater resistance for shamir secret sharing scheme
    • Springer, vol. 4318 of LNCS
    • C. Tartary, and H. Wang, Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme,in Inscrypt, vol. 4318 of LNCS, Springer, pp. 103-117,2006.
    • (2006) Inscrypt , pp. 103-117
    • Tartary, C.1    Wang, H.2
  • 15
    • 33748808745 scopus 로고    scopus 로고
    • Lattice-based threshold changeability for standard CRT secret-sharing schemes
    • R. Steinfeld, J. Pieprzyk, and H. Wang, "Lattice-based threshold changeability for standard CRT secret-sharing schemes," Finite Fields and Their Applications, vol. 2, pp. 653-680,2006.
    • (2006) Finite Fields and Their Applications , vol.2 , pp. 653-680
    • Steinfeld, R.1    Pieprzyk, J.2    Wang, H.3
  • 16
  • 17
    • 58449085225 scopus 로고    scopus 로고
    • Analysis and design of multiple threshold changeable secret sharing schemes
    • Springer
    • T. Lou and C. Tartary,Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes, in Cryptology and Network Security,Springer,Vol. 5339/2008, pp. 196-213, 2008.
    • (2008) Cryptology and Network Security , vol.5339 , Issue.2008 , pp. 196-213
    • Lou, T.1    Tartary, C.2
  • 18
    • 0033351734 scopus 로고    scopus 로고
    • Bounds and techniques for efficient redistribution of secret shares to new access structures
    • K. Martin, J. Pieprzyk, R. Safavi-Naini, H. Wang, Bounds and techniques for efficient redistribution of secret shares to new access structures, The Computer Journal, vol. 42, pp. 638-649,1999.
    • (1999) The Computer Journal , vol.42 , pp. 638-649
    • Martin, K.1    Pieprzyk, J.2    Safavi-Naini, R.3    Wang, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.