메뉴 건너뛰기




Volumn 58, Issue 1, 2011, Pages 11-21

Generalized oblivious transfer by secret sharing

Author keywords

Access structures; Generalized oblivious transfer; Multiparty computation; Oblivious transfer; Secret sharing

Indexed keywords

COMPUTER APPLICATIONS; MATHEMATICAL TECHNIQUES;

EID: 79551472032     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-010-9378-8     Document Type: Article
Times cited : (61)

References (20)
  • 2
    • 61849155741 scopus 로고    scopus 로고
    • Characterizing ideal weighted threshold secret sharing
    • A preliminary version appeared in The Proceeding of TCC, pp. 600-619 (2005)
    • Beimel A., Tassa T., Weinreb E.: Characterizing ideal weighted threshold secret sharing. SIAM J. Disc. Math. 22, 360-397 (2008). A preliminary version appeared in The Proceeding of TCC, pp. 600-619 (2005).
    • (2008) SIAM J. Disc. Math. , vol.22 , pp. 360-397
    • Beimel, A.1    Tassa, T.2    Weinreb, E.3
  • 6
    • 0000354685 scopus 로고
    • Some ideal secret sharing schemes
    • 0685.94003 1025010
    • E.F. Brickell 1989 Some ideal secret sharing schemes J. Combin. Math. Combin. Comput. 6 105 113 0685.94003 1025010
    • (1989) J. Combin. Math. Combin. Comput. , vol.6 , pp. 105-113
    • Brickell, E.F.1
  • 7
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • DOI 10.1145/3812.3818
    • S. Even O. Goldreich A. Lempel 1985 A randomized protocol for signing contracts Commun. ACM 28 637 647 10.1145/3812.3818 800680 (Pubitemid 15569164)
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even Shimon1    Goldreich Oded2    Lempel Abraham3
  • 8
    • 0030150177 scopus 로고    scopus 로고
    • Information without leaking it
    • 10.1145/229459.229469
    • R. Fagin M. Naor P. Winkler 1996 information without leaking it Commun. ACM 39 77 85 10.1145/229459.229469
    • (1996) Commun. ACM , vol.39 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 9
    • 79551498584 scopus 로고    scopus 로고
    • On the Optimization of Bipartite Secret Sharing Schemes
    • Farràs O., Metcalf-Burton J.R., Padró C., Vázquez L.: On the Optimization of Bipartite Secret Sharing Schemes. In: ICITS (2009).
    • (2009) ICITS
    • Farràs, O.1
  • 11
    • 85032194875 scopus 로고
    • How to solve any protocol problem: An efficiency improvement
    • O. Goldreich R. Vainish 1987 How to solve any protocol problem: an efficiency improvement Adv. Cryptol. (CRYPTO), LNCS. 293 73 86
    • (1987) Adv. Cryptol. (CRYPTO), LNCS. , vol.293 , pp. 73-86
    • Goldreich, O.1    Vainish, R.2
  • 12
    • 0030718794 scopus 로고    scopus 로고
    • Private simultaneous messages protocols with applications
    • IEEE Computer Society
    • Ishai Y., Kushilevitz E.: Private simultaneous messages protocols with applications. In: Proceeding of ISTCS97, IEEE Computer Society, pp. 174-184 (1997).
    • (1997) Proceeding of ISTCS97 , pp. 174-184
    • Ishai, Y.1    Kushilevitz, E.2
  • 14
  • 16
    • 22044454088 scopus 로고    scopus 로고
    • Computationally secure oblivious transfer
    • DOI 10.1007/s00145-004-0102-6
    • M. Naor B. Pinkas 2005 Computationally secure oblivious transfer J. Cryptol. 18 1 35 1075.68026 10.1007/s00145-004-0102-6 2117613 (Pubitemid 40963344)
    • (2005) Journal of Cryptology , vol.18 , Issue.1 , pp. 1-35
    • Naor, M.1    Pinkas, B.2
  • 17
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Aiken Computation Laboratory
    • Rabin M.O.: How to exchange secrets by oblivious transfer. Tech. Memo TR-81, Aiken Computation Laboratory (1981).
    • (1981) Tech. Memo TR-81
    • Rabin, M.O.1
  • 18
  • 19
    • 33947522725 scopus 로고    scopus 로고
    • Hierarchical threshold secret sharing
    • An earlier version appeared in Proceeding of the First Theory of Cryptography Conference, pp. 473-490 (2004)
    • Tassa T.: Hierarchical threshold secret sharing. J. Cryptol. 20, 237-264 (2007). An earlier version appeared in Proceeding of the First Theory of Cryptography Conference, pp. 473-490 (2004).
    • (2007) J. Cryptol. , vol.20 , pp. 237-264
    • Tassa, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.