메뉴 건너뛰기




Volumn 60, Issue 2, 2010, Pages 267-271

The use of mathematical linguistic methods in creating secret sharing threshold algorithms

Author keywords

Design of cryptographic algorithms; Mathematical foundations of cryptography; Mathematical linguistics; Secret sharing protocols; Strategic information management

Indexed keywords

CRYPTOGRAPHIC ALGORITHMS; MATHEMATICAL FOUNDATIONS; MATHEMATICAL LINGUISTICS; SECRET SHARING PROTOCOLS; STRATEGIC INFORMATION MANAGEMENT;

EID: 77955715077     PISSN: 08981221     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.camwa.2010.02.028     Document Type: Article
Times cited : (50)

References (16)
  • 2
    • 84920422930 scopus 로고
    • One-time pads are key safeguarding schemes, not cryptosystems: Fast key safeguarding schemes (threshold schemes) exist
    • IEEE Press
    • G.R. Blakley One-time pads are key safeguarding schemes, not cryptosystems: Fast key safeguarding schemes (threshold schemes) exist Proceedings of the 1980 Symposium on Security and Privacy 1980 IEEE Press 108 113
    • (1980) Proceedings of the 1980 Symposium on Security and Privacy , pp. 108-113
    • Blakley, G.R.1
  • 5
    • 84947751790 scopus 로고    scopus 로고
    • Constructions and bounds for visual cryptography
    • G. Ateniese, C. Blundo, A. De Santis, and D.R. Stinson Constructions and bounds for visual cryptography LNCS vol. 1099 1996 416 428
    • (1996) LNCS , vol.1099 , pp. 416-428
    • Ateniese, G.1    Blundo, C.2    De Santis, A.3    Stinson, D.R.4
  • 6
    • 84957652167 scopus 로고
    • General short computational secret sharing schemes
    • P. Beguin, and A. Cresti General short computational secret sharing schemes LNCS vol. 921 1995 194 208
    • (1995) LNCS , vol.921 , pp. 194-208
    • Beguin, P.1    Cresti, A.2
  • 9
    • 67650640434 scopus 로고
    • Generalised cumulative arrays and their application to secret sharing schemes
    • C. Charnes, and J. Pieprzyk Generalised cumulative arrays and their application to secret sharing schemes Australian Computer Science Communications 17 1995 61 65
    • (1995) Australian Computer Science Communications , vol.17 , pp. 61-65
    • Charnes, C.1    Pieprzyk, J.2
  • 11
    • 34247555884 scopus 로고    scopus 로고
    • Privacy-preserving data mining systems
    • N. Hang, and W. Zhao Privacy-preserving data mining systems Computer 40 2007 52 58
    • (2007) Computer , vol.40 , pp. 52-58
    • Hang, N.1    Zhao, W.2
  • 13
    • 15944409593 scopus 로고    scopus 로고
    • Simple secret sharing and threshold RSA signature schemes
    • S. Tang Simple secret sharing and threshold RSA signature schemes Journal of Information and Computational Science 1 2004 259 262
    • (2004) Journal of Information and Computational Science , vol.1 , pp. 259-262
    • Tang, S.1
  • 14
    • 0029211714 scopus 로고
    • A geometric approach for sharing secrets
    • T.-C. Wu, and W.-H. He A geometric approach for sharing secrets Computers and Security 14 1995 135 146
    • (1995) Computers and Security , vol.14 , pp. 135-146
    • Wu, T.-C.1    He, W.-H.2
  • 15
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control schemes and their application in contemporary cryptology
    • IEEE Press
    • G.J. Simmons An introduction to shared secret and/or shared control schemes and their application in contemporary cryptology The Science of Information Integrity 1992 IEEE Press 441 497
    • (1992) The Science of Information Integrity , pp. 441-497
    • Simmons, G.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.