-
1
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
4
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Springer Verlag
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, Proactive secret sharing or: How to cope with perpetual leakage, in proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, Springer Verlag, pp. 339-352, 1995.
-
(1995)
Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
5
-
-
33747469206
-
Changing thresholds in the absence of secure channels
-
K. Martin, J. Pieprzyk, R. Safavi-Naini, and H. Wang, Changing thresholds in the absence of secure channels, J. Australian Comput., vol. 31,pp. 34-43, 1999.
-
(1999)
J. Australian Comput.
, vol.31
, pp. 34-43
-
-
Martin, K.1
Pieprzyk, J.2
Safavi-Naini, R.3
Wang, H.4
-
6
-
-
84958752925
-
Efficient and unconditionally secure verifiable threshold changeable scheme
-
Springer-Verlag, Sydney: Australia, vol 2119 of LNCS, July
-
A. Maeda, A. Miyaji, and M. Tada, Efficient and unconditionally secure verifiable threshold changeable scheme, in proceedings of ACISP(2001), Springer-Verlag, Sydney: Australia, vol 2119 of LNCS, pp. 402-416, July 2001.
-
(2001)
Proceedings of ACISP(2001)
, pp. 402-416
-
-
Maeda, A.1
Miyaji, A.2
Tada, M.3
-
7
-
-
33748413820
-
Secret sharing schemes with partial broadcast channels, manuscript
-
R. Safavi-Naini and H. Wang, Secret sharing schemes with partial broadcast channels, manuscript, Des. Codes Cryptography.,vol. 41,pp. 5-22, 2006.
-
(2006)
Des. Codes Cryptography
, vol.41
, pp. 5-22
-
-
Safavi-Naini, R.1
Wang, H.2
-
8
-
-
38349104231
-
On secret reconstruction in secret sharing schemes
-
H. Wang, Wang D. S, "On Secret Reconstruction in Secret Sharing Schemes," IEEE Trans, Inf. Theory, vol. 54, pp. 473-480,2008.
-
(2008)
IEEE Trans, Inf. Theory
, vol.54
, pp. 473-480
-
-
Wang, H.1
Wang, D.S.2
-
9
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in proceedings of FOCS(1985),pp. 383-395,1985.
-
(1985)
Proceedings of FOCS(1985)
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
10
-
-
0024141971
-
How to share a secret with cheaters
-
M. Tompa and H. Woll, How to share a secret with cheaters, Journal of Cryptology, pp. 133-138, 1988.
-
(1988)
Journal of Cryptology
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
-
11
-
-
77954335302
-
Non-interactive and informationtheoretic secure publicly verifiable secret sharing
-
C. Tang, Z. Liu, and Y. He, Non-interactive and informationtheoretic secure publicly verifiable secret sharing, Cryptology ePrint Archive, Report 2004/201, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology ePrint Archive, Report 2004/201
-
-
Tang, C.1
Liu, Z.2
He, Y.3
-
12
-
-
33845960920
-
Lattice-based threshold changeability for standard shamir secret-sharing schemes
-
Lncs
-
R. Steinfeld, H. Wang, and J. Pieprzyk, "Lattice-based threshold changeability for standard Shamir secret-sharing schemes," In Advances in Cryptology-Asiacrypt'04, Lncs, vol. 3329,pp. 170-186,2004.
-
(2004)
Advances in Cryptology-Asiacrypt'04
, vol.3329
, pp. 170-186
-
-
Steinfeld, R.1
Wang, H.2
Pieprzyk, J.3
-
13
-
-
33845927130
-
Dynamic threshold and cheater resistance for shamir secret sharing scheme
-
Springer, vol. 4318 of LNCS
-
C. Tartary, and H. Wang, Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme,in Inscrypt, vol. 4318 of LNCS, Springer, pp. 103-117,2006.
-
(2006)
Inscrypt
, pp. 103-117
-
-
Tartary, C.1
Wang, H.2
-
15
-
-
33748808745
-
Lattice-based threshold changeability for standard CRT secret-sharing schemes
-
R. Steinfeld, J. Pieprzyk, and H. Wang, "Lattice-based threshold changeability for standard CRT secret-sharing schemes," Finite Fields and Their Applications, vol. 2, pp. 653-680,2006.
-
(2006)
Finite Fields and Their Applications
, vol.2
, pp. 653-680
-
-
Steinfeld, R.1
Pieprzyk, J.2
Wang, H.3
-
17
-
-
58449085225
-
Analysis and design of multiple threshold changeable secret sharing schemes
-
Springer
-
T. Lou and C. Tartary,Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes, in Cryptology and Network Security,Springer,Vol. 5339/2008, pp. 196-213, 2008.
-
(2008)
Cryptology and Network Security
, vol.5339
, Issue.2008
, pp. 196-213
-
-
Lou, T.1
Tartary, C.2
-
18
-
-
0033351734
-
Bounds and techniques for efficient redistribution of secret shares to new access structures
-
K. Martin, J. Pieprzyk, R. Safavi-Naini, H. Wang, Bounds and techniques for efficient redistribution of secret shares to new access structures, The Computer Journal, vol. 42, pp. 638-649,1999.
-
(1999)
The Computer Journal
, vol.42
, pp. 638-649
-
-
Martin, K.1
Pieprzyk, J.2
Safavi-Naini, R.3
Wang, H.4
|