-
1
-
-
67049158199
-
Distributed Public-key Cryptography from Weak Secrets
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Abdalla, M., Boyen, X., Chevalier, C., Pointcheval, D.: Distributed Public-key Cryptography from Weak Secrets. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 139-159. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 139-159
-
-
Abdalla, M.1
Boyen, X.2
Chevalier, C.3
Pointcheval, D.4
-
2
-
-
79952510987
-
Expressive Key-policy Attribute-based Encryption with Constant-size Ciphertexts
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Attrapadung, N., Libert, B., de Panafieu, E.: Expressive Key-policy Attribute-based Encryption with Constant-size Ciphertexts. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 90-108. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 90-108
-
-
Attrapadung, N.1
Libert, B.2
De Panafieu, E.3
-
3
-
-
84957652167
-
General Short Computational Secret Sharing Schemes
-
Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. Springer, Heidelberg
-
Béguin, P., Cresti, A.: General Short Computational Secret Sharing Schemes. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 194-208. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.921
, pp. 194-208
-
-
Béguin, P.1
Cresti, A.2
-
4
-
-
84961369151
-
Security of Ramp Schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Blakley, G.R., Meadows, C.: Security of Ramp Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 242-268. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 242-268
-
-
Blakley, G.R.1
Meadows, C.2
-
5
-
-
0030257491
-
Fully dynamic secret sharing schemes
-
Blundo, C., Cresti, A., De Santis, A., Vaccaro, U.: Fully dynamic secret sharing schemes. Theor. Comput. Sci. 165(2), 407-440 (1996)
-
(1996)
Theor. Comput. Sci.
, vol.165
, Issue.2
, pp. 407-440
-
-
Blundo, C.1
Cresti, A.2
De Santis, A.3
Vaccaro, U.4
-
6
-
-
85005949623
-
Multisecret Sharing Schemes
-
Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
-
Blundo, C., De Santis, A., Di Crescenzo, G., Gaggia, A.G., Vaccaro, U.: Multisecret Sharing Schemes. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 150-163. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 150-163
-
-
Blundo, C.1
De Santis, A.2
Di Crescenzo, G.3
Gaggia, A.G.4
Vaccaro, U.5
-
7
-
-
33745655389
-
Chosen cipher-text secure public key threshold encryption without random oracles
-
DOI 10.1007/11605805-15, Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, Proceedings
-
Boneh, D., Boyen, X., Halevi, S.: Chosen Ciphertext Secure Public Key Threshold Encryption without Random Oracles. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 226-243. Springer, Heidelberg (2006) (Pubitemid 43971712)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3960 LNCS
, pp. 226-243
-
-
Boneh, D.1
Boyen, X.2
Halevi, S.3
-
8
-
-
77953525686
-
Strong Cryptography from Weak Secrets
-
Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. Springer, Heidelberg
-
Boyen, X., Chevalier, C., Fuchsbauer, G., Pointcheval, D.: Strong Cryptography from Weak Secrets. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 297-315. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6055
, pp. 297-315
-
-
Boyen, X.1
Chevalier, C.2
Fuchsbauer, G.3
Pointcheval, D.4
-
9
-
-
84863309918
-
Some Ideal Secret Sharing Schemes
-
Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. Springer, Heidelberg
-
Brickell, E.F.: Some Ideal Secret Sharing Schemes. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 468-475. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.434
, pp. 468-475
-
-
Brickell, E.F.1
-
10
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
Brickell, E.F., Stinson, D.R.: Some improved bounds on the information rate of perfect secret sharing schemes. J. Cryptology 5(3), 153-166 (1992)
-
(1992)
J. Cryptology
, vol.5
, Issue.3
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
11
-
-
84947912228
-
On-line secret sharing
-
Cachin, C.: On-line secret sharing. In: IMA Conf., pp. 190-198 (1995)
-
(1995)
IMA Conf.
, pp. 190-198
-
-
Cachin, C.1
-
12
-
-
0001607361
-
The size of a share must be large
-
Csirmaz, L.: The size of a share must be large. J. Cryptology 10(4), 223-231 (1997)
-
(1997)
J. Cryptology
, vol.10
, Issue.4
, pp. 223-231
-
-
Csirmaz, L.1
-
13
-
-
81055153659
-
On-line secret sharing
-
ePrint Archive, Report 2011/174
-
Csirmaz, L., Tardos, G.: On-line secret sharing. Cryptology ePrint Archive, Report 2011/174 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology
-
-
Csirmaz, L.1
Tardos, G.2
-
14
-
-
85023809951
-
Threshold Cryptosystems
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307-315. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
15
-
-
70350700885
-
Non-malleable extractors and symmetric key cryptography from weak secrets
-
Dodis, Y., Wichs, D.: Non-malleable extractors and symmetric key cryptography from weak secrets. In: STOC, pp. 601-610 (2009)
-
(2009)
STOC
, pp. 601-610
-
-
Dodis, Y.1
Wichs, D.2
-
16
-
-
40249098609
-
Faster and Shorter Password-authenticated Key Exchange
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Gennaro, R.: Faster and Shorter Password-authenticated Key Exchange. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 589-606. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 589-606
-
-
Gennaro, R.1
-
17
-
-
33745793866
-
Password authenticated key exchange using hidden smooth subgroups
-
Gentry, C., MacKenzie, P.D., Ramzan, Z.: Password authenticated key exchange using hidden smooth subgroups. In: ACM Conference on Computer and Communications Security, pp. 299-309 (2005)
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 299-309
-
-
Gentry, C.1
MacKenzie, P.D.2
Ramzan, Z.3
-
18
-
-
33750018128
-
Rational Secret Sharing, Revisited
-
De Prisco, R., Yung, M. (eds.) SCN 2006. Springer, Heidelberg
-
Gordon, S.D., Katz, J.: Rational Secret Sharing, Revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229-241. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4116
, pp. 229-241
-
-
Gordon, S.D.1
Katz, J.2
-
19
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89-98 (2006)
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
20
-
-
4544259607
-
Rational secret sharing and multiparty computation: Extended abstract
-
Halpern, J.Y., Teague, V.: Rational secret sharing and multiparty computation: extended abstract. In: STOC, pp. 623-632 (2004)
-
(2004)
STOC
, pp. 623-632
-
-
Halpern, J.Y.1
Teague, V.2
-
21
-
-
84957626176
-
Proactive Secret Sharing or: How to Cope with Perpetual Leakage
-
Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
-
Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive Secret Sharing or: How to Cope with Perpetual Leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339-352. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
22
-
-
0032163101
-
An on-line secret sharing scheme for multi-secrets
-
Hwang, R.-J., Chang, C.-C.: An on-line secret sharing scheme for multi-secrets. Computer Communications 21(13), 1170-1176 (1998)
-
(1998)
Computer Communications
, vol.21
, Issue.13
, pp. 1170-1176
-
-
Hwang, R.-J.1
Chang, C.-C.2
-
23
-
-
77950662892
-
A rational secret-sharing scheme based on RSA-OAEP
-
Isshiki, T., Wada, K., Tanaka, K.: A rational secret-sharing scheme based on RSA-OAEP. IEICE Transactions 93-A(1), 42-49 (2010)
-
(2010)
IEICE Transactions
, vol.93 A
, Issue.1
, pp. 42-49
-
-
Isshiki, T.1
Wada, K.2
Tanaka, K.3
-
24
-
-
0023543848
-
Secret sharing scheme realizing general access structure
-
Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. In: Proceedings IEEE Globecom 1987, pp. 99-102 (1987)
-
(1987)
Proceedings IEEE Globecom
, vol.1987
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
25
-
-
33846416581
-
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures
-
Iwamoto, M., Yamamoto, H., Ogawa, H.: Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures. IEICE Transactions 90-A(1), 101-112 (2007)
-
(2007)
IEICE Transactions
, vol.90 A
, Issue.1
, pp. 101-112
-
-
Iwamoto, M.1
Yamamoto, H.2
Ogawa, H.3
-
26
-
-
84945132563
-
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Katz, J., Ostrovsky, R., Yung, M.: Efficient Password-authenticated Key Exchange using Human-memorable Passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475-494. Springer, Heidelberg (2001) (Pubitemid 33275849)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
27
-
-
57049100461
-
Games for exchanging information
-
Kol, G., Naor, M.: Games for exchanging information. In: STOC, pp. 423-432 (2008)
-
(2008)
STOC
, pp. 423-432
-
-
Kol, G.1
Naor, M.2
-
28
-
-
85028775022
-
Secret Sharing Made Short
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Krawczyk, H.: Secret Sharing Made Short. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 136-146. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 136-146
-
-
Krawczyk, H.1
-
29
-
-
81055135809
-
A fast (k, L, n)-threshold ramp secret sharing scheme
-
Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (k, L, n)-threshold ramp secret sharing scheme. IEICE Transactions 92-A(8), 1808-1821 (2009)
-
(2009)
IEICE Transactions
, vol.92 A
, Issue.8
, pp. 1808-1821
-
-
Kurihara, J.1
Kiyomoto, S.2
Fukushima, K.3
Tanaka, T.4
-
30
-
-
29644437598
-
Threshold password-authenticated key exchange
-
MacKenzie, P.D., Shrimpton, T., Jakobsson, M.: Threshold password-authenticated key exchange. J. Cryptology 19(1), 27-66 (2006)
-
(2006)
J. Cryptology
, vol.19
, Issue.1
, pp. 27-66
-
-
MacKenzie, P.D.1
Shrimpton, T.2
Jakobsson, M.3
-
31
-
-
32144455532
-
Secret sharing schemes on access structures with intersection number equal to one
-
Martí-Farré, J., Padró, C.: Secret sharing schemes on access structures with intersection number equal to one. Discrete Applied Mathematics 154(3), 552-563 (2006)
-
(2006)
Discrete Applied Mathematics
, vol.154
, Issue.3
, pp. 552-563
-
-
Martí-Farré, J.1
Padró, C.2
-
32
-
-
70350281824
-
Purely Rational Secret Sharing
-
(Extended Abstract). Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Micali, S., Shelat, A.: Purely Rational Secret Sharing (Extended Abstract). In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 54-71. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 54-71
-
-
Micali, S.1
Shelat, A.2
-
33
-
-
33745627522
-
On Proactive Secret Sharing Schemes
-
Handschuh, H., Hasan, M.A. (eds.) SAC 2004. Springer, Heidelberg
-
Nikov, V., Nikova, S.: On Proactive Secret Sharing Schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 308-325. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3357
, pp. 308-325
-
-
Nikov, V.1
Nikova, S.2
-
34
-
-
77952383290
-
Attribute-based encryption with partially hidden ciphertext policies
-
Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden ciphertext policies. IEICE Transactions 92-A(1), 22-32 (2009)
-
(2009)
IEICE Transactions
, vol.92 A
, Issue.1
, pp. 22-32
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
35
-
-
78650959016
-
Provably secure on-line secret sharing scheme
-
Oba, T., Ogata, W.: Provably secure on-line secret sharing scheme. IEICE Transactions 94-A(1), 139-149 (2011)
-
(2011)
IEICE Transactions
, vol.94 A
, Issue.1
, pp. 139-149
-
-
Oba, T.1
Ogata, W.2
-
36
-
-
78650855071
-
Threshold Public-key Encryption with Adaptive Security and Short Ciphertexts
-
Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. Springer, Heidelberg
-
Qin, B., Wu, Q., Zhang, L., Domingo-Ferrer, J.: Threshold Public-key Encryption with Adaptive Security and Short Ciphertexts. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 62-76. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6476
, pp. 62-76
-
-
Qin, B.1
Wu, Q.2
Zhang, L.3
Domingo-Ferrer, J.4
-
37
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
38
-
-
78049487432
-
Security analysis of two augmented password-authenticated key exchange protocols
-
Shin, S., Kobara, K., Imai, H.: Security analysis of two augmented password-authenticated key exchange protocols. IEICE Transactions 93-A(11), 2092-2095 (2010)
-
(2010)
IEICE Transactions
, vol.93 A
, Issue.11
, pp. 2092-2095
-
-
Shin, S.1
Kobara, K.2
Imai, H.3
-
39
-
-
84944048103
-
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures
-
Heys, H.M., Adams, C.M. (eds.) SAC 1999. Springer, Heidelberg
-
Stinson, D.R., Wei, R.: Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 200-214. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1758
, pp. 200-214
-
-
Stinson, D.R.1
Wei, R.2
-
40
-
-
0032627523
-
On-line multiple secret sharing based on a one-way function
-
Sun, H.-M.: On-line multiple secret sharing based on a one-way function. Computer Communications 22(8), 745-748 (1999)
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 745-748
-
-
Sun, H.-M.1
-
41
-
-
35048827923
-
Hierarchical Threshold Secret Sharing
-
Naor, M. (ed.) TCC 2004. Springer, Heidelberg
-
Tassa, T.: Hierarchical Threshold Secret Sharing. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 473-490. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 473-490
-
-
Tassa, T.1
-
42
-
-
33947522725
-
Hierarchical threshold secret sharing
-
Tassa, T.: Hierarchical threshold secret sharing. J. Cryptology 20(2), 237-264 (2007)
-
(2007)
J. Cryptology
, vol.20
, Issue.2
, pp. 237-264
-
-
Tassa, T.1
-
43
-
-
64249091460
-
Multipartite secret sharing by bivariate interpolation
-
Tassa, T., Dyn, N.: Multipartite secret sharing by bivariate interpolation. J. Cryptology 22(2), 227-258 (2009)
-
(2009)
J. Cryptology
, vol.22
, Issue.2
, pp. 227-258
-
-
Tassa, T.1
Dyn, N.2
-
44
-
-
3142661783
-
Efficient secret sharing schemes realizing general access structures
-
Tochikubo, K.: Efficient secret sharing schemes realizing general access structures. IEICE Transactions 87-A(7), 1788-1797 (2004)
-
(2004)
IEICE Transactions
, vol.87 A
, Issue.7
, pp. 1788-1797
-
-
Tochikubo, K.1
-
45
-
-
79952493650
-
Generic Constructions for Chosen-ciphertext Secure Attribute Based Encryption
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N.: Generic Constructions for Chosen-ciphertext Secure Attribute Based Encryption. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 71-89. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 71-89
-
-
Yamada, S.1
Attrapadung, N.2
Hanaoka, G.3
Kunihiro, N.4
-
46
-
-
77952349862
-
Does secure password-based authenticated key exchange against leakage of internal states exist?
-
Yoneyama, K.: Does secure password-based authenticated key exchange against leakage of internal states exist? IEICE Transactions 92-A(1), 113-121 (2009)
-
(2009)
IEICE Transactions
, vol.92 A
, Issue.1
, pp. 113-121
-
-
Yoneyama, K.1
|