메뉴 건너뛰기




Volumn 7043 LNCS, Issue , 2011, Pages 143-157

Ideal secret sharing schemes with share selectability

Author keywords

[No Author keywords available]

Indexed keywords

ARBITRARY VALUES; HIERARCHICAL STRUCTURES; LEAKAGE INFORMATION; SECRET SHARING; SECRET SHARING SCHEMES;

EID: 81055147884     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25243-3_12     Document Type: Conference Paper
Times cited : (1)

References (46)
  • 1
    • 67049158199 scopus 로고    scopus 로고
    • Distributed Public-key Cryptography from Weak Secrets
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Abdalla, M., Boyen, X., Chevalier, C., Pointcheval, D.: Distributed Public-key Cryptography from Weak Secrets. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 139-159. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 139-159
    • Abdalla, M.1    Boyen, X.2    Chevalier, C.3    Pointcheval, D.4
  • 2
    • 79952510987 scopus 로고    scopus 로고
    • Expressive Key-policy Attribute-based Encryption with Constant-size Ciphertexts
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Attrapadung, N., Libert, B., de Panafieu, E.: Expressive Key-policy Attribute-based Encryption with Constant-size Ciphertexts. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 90-108. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 90-108
    • Attrapadung, N.1    Libert, B.2    De Panafieu, E.3
  • 3
    • 84957652167 scopus 로고
    • General Short Computational Secret Sharing Schemes
    • Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. Springer, Heidelberg
    • Béguin, P., Cresti, A.: General Short Computational Secret Sharing Schemes. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 194-208. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.921 , pp. 194-208
    • Béguin, P.1    Cresti, A.2
  • 4
    • 84961369151 scopus 로고
    • Security of Ramp Schemes
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Blakley, G.R., Meadows, C.: Security of Ramp Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 242-268. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 242-268
    • Blakley, G.R.1    Meadows, C.2
  • 6
    • 85005949623 scopus 로고
    • Multisecret Sharing Schemes
    • Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
    • Blundo, C., De Santis, A., Di Crescenzo, G., Gaggia, A.G., Vaccaro, U.: Multisecret Sharing Schemes. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 150-163. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 150-163
    • Blundo, C.1    De Santis, A.2    Di Crescenzo, G.3    Gaggia, A.G.4    Vaccaro, U.5
  • 8
    • 77953525686 scopus 로고    scopus 로고
    • Strong Cryptography from Weak Secrets
    • Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. Springer, Heidelberg
    • Boyen, X., Chevalier, C., Fuchsbauer, G., Pointcheval, D.: Strong Cryptography from Weak Secrets. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 297-315. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6055 , pp. 297-315
    • Boyen, X.1    Chevalier, C.2    Fuchsbauer, G.3    Pointcheval, D.4
  • 9
    • 84863309918 scopus 로고
    • Some Ideal Secret Sharing Schemes
    • Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. Springer, Heidelberg
    • Brickell, E.F.: Some Ideal Secret Sharing Schemes. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 468-475. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.434 , pp. 468-475
    • Brickell, E.F.1
  • 10
    • 0026992660 scopus 로고
    • Some improved bounds on the information rate of perfect secret sharing schemes
    • Brickell, E.F., Stinson, D.R.: Some improved bounds on the information rate of perfect secret sharing schemes. J. Cryptology 5(3), 153-166 (1992)
    • (1992) J. Cryptology , vol.5 , Issue.3 , pp. 153-166
    • Brickell, E.F.1    Stinson, D.R.2
  • 11
    • 84947912228 scopus 로고
    • On-line secret sharing
    • Cachin, C.: On-line secret sharing. In: IMA Conf., pp. 190-198 (1995)
    • (1995) IMA Conf. , pp. 190-198
    • Cachin, C.1
  • 12
    • 0001607361 scopus 로고    scopus 로고
    • The size of a share must be large
    • Csirmaz, L.: The size of a share must be large. J. Cryptology 10(4), 223-231 (1997)
    • (1997) J. Cryptology , vol.10 , Issue.4 , pp. 223-231
    • Csirmaz, L.1
  • 13
    • 81055153659 scopus 로고    scopus 로고
    • On-line secret sharing
    • ePrint Archive, Report 2011/174
    • Csirmaz, L., Tardos, G.: On-line secret sharing. Cryptology ePrint Archive, Report 2011/174 (2011), http://eprint.iacr.org/
    • (2011) Cryptology
    • Csirmaz, L.1    Tardos, G.2
  • 14
    • 85023809951 scopus 로고
    • Threshold Cryptosystems
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307-315. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 15
    • 70350700885 scopus 로고    scopus 로고
    • Non-malleable extractors and symmetric key cryptography from weak secrets
    • Dodis, Y., Wichs, D.: Non-malleable extractors and symmetric key cryptography from weak secrets. In: STOC, pp. 601-610 (2009)
    • (2009) STOC , pp. 601-610
    • Dodis, Y.1    Wichs, D.2
  • 16
    • 40249098609 scopus 로고    scopus 로고
    • Faster and Shorter Password-authenticated Key Exchange
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Gennaro, R.: Faster and Shorter Password-authenticated Key Exchange. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 589-606. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 589-606
    • Gennaro, R.1
  • 18
    • 33750018128 scopus 로고    scopus 로고
    • Rational Secret Sharing, Revisited
    • De Prisco, R., Yung, M. (eds.) SCN 2006. Springer, Heidelberg
    • Gordon, S.D., Katz, J.: Rational Secret Sharing, Revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229-241. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4116 , pp. 229-241
    • Gordon, S.D.1    Katz, J.2
  • 20
    • 4544259607 scopus 로고    scopus 로고
    • Rational secret sharing and multiparty computation: Extended abstract
    • Halpern, J.Y., Teague, V.: Rational secret sharing and multiparty computation: extended abstract. In: STOC, pp. 623-632 (2004)
    • (2004) STOC , pp. 623-632
    • Halpern, J.Y.1    Teague, V.2
  • 21
    • 84957626176 scopus 로고
    • Proactive Secret Sharing or: How to Cope with Perpetual Leakage
    • Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
    • Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive Secret Sharing or: How to Cope with Perpetual Leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339-352. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 22
    • 0032163101 scopus 로고    scopus 로고
    • An on-line secret sharing scheme for multi-secrets
    • Hwang, R.-J., Chang, C.-C.: An on-line secret sharing scheme for multi-secrets. Computer Communications 21(13), 1170-1176 (1998)
    • (1998) Computer Communications , vol.21 , Issue.13 , pp. 1170-1176
    • Hwang, R.-J.1    Chang, C.-C.2
  • 23
    • 77950662892 scopus 로고    scopus 로고
    • A rational secret-sharing scheme based on RSA-OAEP
    • Isshiki, T., Wada, K., Tanaka, K.: A rational secret-sharing scheme based on RSA-OAEP. IEICE Transactions 93-A(1), 42-49 (2010)
    • (2010) IEICE Transactions , vol.93 A , Issue.1 , pp. 42-49
    • Isshiki, T.1    Wada, K.2    Tanaka, K.3
  • 24
    • 0023543848 scopus 로고
    • Secret sharing scheme realizing general access structure
    • Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. In: Proceedings IEEE Globecom 1987, pp. 99-102 (1987)
    • (1987) Proceedings IEEE Globecom , vol.1987 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 25
    • 33846416581 scopus 로고    scopus 로고
    • Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures
    • Iwamoto, M., Yamamoto, H., Ogawa, H.: Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures. IEICE Transactions 90-A(1), 101-112 (2007)
    • (2007) IEICE Transactions , vol.90 A , Issue.1 , pp. 101-112
    • Iwamoto, M.1    Yamamoto, H.2    Ogawa, H.3
  • 26
    • 84945132563 scopus 로고    scopus 로고
    • Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Katz, J., Ostrovsky, R., Yung, M.: Efficient Password-authenticated Key Exchange using Human-memorable Passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475-494. Springer, Heidelberg (2001) (Pubitemid 33275849)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 27
    • 57049100461 scopus 로고    scopus 로고
    • Games for exchanging information
    • Kol, G., Naor, M.: Games for exchanging information. In: STOC, pp. 423-432 (2008)
    • (2008) STOC , pp. 423-432
    • Kol, G.1    Naor, M.2
  • 28
    • 85028775022 scopus 로고
    • Secret Sharing Made Short
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Krawczyk, H.: Secret Sharing Made Short. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 136-146. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 136-146
    • Krawczyk, H.1
  • 29
    • 81055135809 scopus 로고    scopus 로고
    • A fast (k, L, n)-threshold ramp secret sharing scheme
    • Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (k, L, n)-threshold ramp secret sharing scheme. IEICE Transactions 92-A(8), 1808-1821 (2009)
    • (2009) IEICE Transactions , vol.92 A , Issue.8 , pp. 1808-1821
    • Kurihara, J.1    Kiyomoto, S.2    Fukushima, K.3    Tanaka, T.4
  • 30
    • 29644437598 scopus 로고    scopus 로고
    • Threshold password-authenticated key exchange
    • MacKenzie, P.D., Shrimpton, T., Jakobsson, M.: Threshold password-authenticated key exchange. J. Cryptology 19(1), 27-66 (2006)
    • (2006) J. Cryptology , vol.19 , Issue.1 , pp. 27-66
    • MacKenzie, P.D.1    Shrimpton, T.2    Jakobsson, M.3
  • 31
    • 32144455532 scopus 로고    scopus 로고
    • Secret sharing schemes on access structures with intersection number equal to one
    • Martí-Farré, J., Padró, C.: Secret sharing schemes on access structures with intersection number equal to one. Discrete Applied Mathematics 154(3), 552-563 (2006)
    • (2006) Discrete Applied Mathematics , vol.154 , Issue.3 , pp. 552-563
    • Martí-Farré, J.1    Padró, C.2
  • 32
    • 70350281824 scopus 로고    scopus 로고
    • Purely Rational Secret Sharing
    • (Extended Abstract). Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Micali, S., Shelat, A.: Purely Rational Secret Sharing (Extended Abstract). In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 54-71. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 54-71
    • Micali, S.1    Shelat, A.2
  • 33
    • 33745627522 scopus 로고    scopus 로고
    • On Proactive Secret Sharing Schemes
    • Handschuh, H., Hasan, M.A. (eds.) SAC 2004. Springer, Heidelberg
    • Nikov, V., Nikova, S.: On Proactive Secret Sharing Schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 308-325. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3357 , pp. 308-325
    • Nikov, V.1    Nikova, S.2
  • 34
    • 77952383290 scopus 로고    scopus 로고
    • Attribute-based encryption with partially hidden ciphertext policies
    • Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden ciphertext policies. IEICE Transactions 92-A(1), 22-32 (2009)
    • (2009) IEICE Transactions , vol.92 A , Issue.1 , pp. 22-32
    • Nishide, T.1    Yoneyama, K.2    Ohta, K.3
  • 35
    • 78650959016 scopus 로고    scopus 로고
    • Provably secure on-line secret sharing scheme
    • Oba, T., Ogata, W.: Provably secure on-line secret sharing scheme. IEICE Transactions 94-A(1), 139-149 (2011)
    • (2011) IEICE Transactions , vol.94 A , Issue.1 , pp. 139-149
    • Oba, T.1    Ogata, W.2
  • 36
    • 78650855071 scopus 로고    scopus 로고
    • Threshold Public-key Encryption with Adaptive Security and Short Ciphertexts
    • Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. Springer, Heidelberg
    • Qin, B., Wu, Q., Zhang, L., Domingo-Ferrer, J.: Threshold Public-key Encryption with Adaptive Security and Short Ciphertexts. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 62-76. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6476 , pp. 62-76
    • Qin, B.1    Wu, Q.2    Zhang, L.3    Domingo-Ferrer, J.4
  • 37
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979)
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 38
    • 78049487432 scopus 로고    scopus 로고
    • Security analysis of two augmented password-authenticated key exchange protocols
    • Shin, S., Kobara, K., Imai, H.: Security analysis of two augmented password-authenticated key exchange protocols. IEICE Transactions 93-A(11), 2092-2095 (2010)
    • (2010) IEICE Transactions , vol.93 A , Issue.11 , pp. 2092-2095
    • Shin, S.1    Kobara, K.2    Imai, H.3
  • 39
    • 84944048103 scopus 로고    scopus 로고
    • Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures
    • Heys, H.M., Adams, C.M. (eds.) SAC 1999. Springer, Heidelberg
    • Stinson, D.R., Wei, R.: Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 200-214. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1758 , pp. 200-214
    • Stinson, D.R.1    Wei, R.2
  • 40
    • 0032627523 scopus 로고    scopus 로고
    • On-line multiple secret sharing based on a one-way function
    • Sun, H.-M.: On-line multiple secret sharing based on a one-way function. Computer Communications 22(8), 745-748 (1999)
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 745-748
    • Sun, H.-M.1
  • 41
    • 35048827923 scopus 로고    scopus 로고
    • Hierarchical Threshold Secret Sharing
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Tassa, T.: Hierarchical Threshold Secret Sharing. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 473-490. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 473-490
    • Tassa, T.1
  • 42
    • 33947522725 scopus 로고    scopus 로고
    • Hierarchical threshold secret sharing
    • Tassa, T.: Hierarchical threshold secret sharing. J. Cryptology 20(2), 237-264 (2007)
    • (2007) J. Cryptology , vol.20 , Issue.2 , pp. 237-264
    • Tassa, T.1
  • 43
    • 64249091460 scopus 로고    scopus 로고
    • Multipartite secret sharing by bivariate interpolation
    • Tassa, T., Dyn, N.: Multipartite secret sharing by bivariate interpolation. J. Cryptology 22(2), 227-258 (2009)
    • (2009) J. Cryptology , vol.22 , Issue.2 , pp. 227-258
    • Tassa, T.1    Dyn, N.2
  • 44
    • 3142661783 scopus 로고    scopus 로고
    • Efficient secret sharing schemes realizing general access structures
    • Tochikubo, K.: Efficient secret sharing schemes realizing general access structures. IEICE Transactions 87-A(7), 1788-1797 (2004)
    • (2004) IEICE Transactions , vol.87 A , Issue.7 , pp. 1788-1797
    • Tochikubo, K.1
  • 45
    • 79952493650 scopus 로고    scopus 로고
    • Generic Constructions for Chosen-ciphertext Secure Attribute Based Encryption
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N.: Generic Constructions for Chosen-ciphertext Secure Attribute Based Encryption. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 71-89. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 71-89
    • Yamada, S.1    Attrapadung, N.2    Hanaoka, G.3    Kunihiro, N.4
  • 46
    • 77952349862 scopus 로고    scopus 로고
    • Does secure password-based authenticated key exchange against leakage of internal states exist?
    • Yoneyama, K.: Does secure password-based authenticated key exchange against leakage of internal states exist? IEICE Transactions 92-A(1), 113-121 (2009)
    • (2009) IEICE Transactions , vol.92 A , Issue.1 , pp. 113-121
    • Yoneyama, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.