메뉴 건너뛰기




Volumn 7073 LNCS, Issue , 2011, Pages 590-609

Computational verifiable secret sharing revisited

Author keywords

Commitments; Homomorphism; Round Complexity; Verifiable Secret Sharing

Indexed keywords

ASYNCHRONOUS COMMUNICATION MODEL; COMMITMENTS; COMMUNICATION COMPLEXITY; COMPLEXITY MEASURES; COMPUTATIONAL SETTINGS; HOMOMORPHISM; ROUND COMPLEXITY; SYNCHRONOUS COMMUNICATIONS; VERIFIABLE SECRET SHARING;

EID: 82955184587     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25385-0_32     Document Type: Conference Paper
Times cited : (55)

References (31)
  • 3
    • 0038687710 scopus 로고    scopus 로고
    • Asynchronous verifiable secret sharing and proactive cryptosystems
    • Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems. In: ACM CCS 2002, pp. 88-97(2002)
    • (2002) ACM CCS 2002 , pp. 88-97
    • Cachin, C.1    Kursawe, K.2    Lysyanskaya, A.3    Strobl, R.4
  • 7
    • 84958760787 scopus 로고    scopus 로고
    • On unconditionally secure robust distributed key distribution centers
    • Zheng, Y. ed., Springer, Heidelberg
    • D'Arco, P., Stinson, D. R.: On Unconditionally Secure Robust Distributed Key Distribution Centers. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 346-363. Springer, Heidelberg (2002)
    • (2002) ASIACRYPT 2002. LNCS , vol.2501 , pp. 346-363
    • D'Arco, P.1    Stinson, D.R.2
  • 8
    • 0027341860 scopus 로고
    • Perfectly secure message transmission
    • Dolev, D., Dwork, C., Waarts, O., Yung, M.: Perfectly secure message transmission. J. ACM 40(1), 17-47(1993)
    • (1993) J. ACM , vol.40 , Issue.1 , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 12
    • 33846862213 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • DOI 10.1007/s00145-006-0347-3
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. of Cryptology 20(1), 51-83(2007) (Pubitemid 46224826)
    • (2007) Journal of Cryptology , vol.20 , Issue.1 , pp. 51-83
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 13
    • 0031628398 scopus 로고    scopus 로고
    • Simplified VSS and fact-track multiparty computations with applications to threshold cryptography
    • Gennaro, R., Rabin, M. O., Rabin, T.: Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography. In: ACM PODC 1998, pp. 101-111(1998)
    • (1998) ACM PODC 1998 , pp. 101-111
    • Gennaro, R.1    Rabin, M.O.2    Rabin, T.3
  • 14
    • 0000108216 scopus 로고    scopus 로고
    • How to construct constant-round zero-knowledge proof systems for NP
    • Goldreich, O., Kahan, A.: How to Construct Constant-Round Zero-Knowledge Proof Systems for NP. J. Cryptology 9(3), 167-190(1996)
    • (1996) J. Cryptology , vol.9 , Issue.3 , pp. 167-190
    • Goldreich, O.1    Kahan, A.2
  • 15
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity for all languages in np have zero-knowledge proof systems
    • Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity for all languages in np have zero-knowledge proof systems. J. ACM 38(3), 691-729(1991)
    • (1991) J. ACM , vol.38 , Issue.3 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 17
    • 0037519332 scopus 로고    scopus 로고
    • Practical and provably-secure commitment schemes from collision-free hashing
    • Advances in Cryptology - CRYPTO '96
    • Halevi, S., Micali, S.: Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 201-215. Springer, Heidelberg (1996) (Pubitemid 126106241)
    • (1996) Lecture Notes in Computer Science , Issue.1109 , pp. 201-215
    • Halevi, S.1    Micali, S.2
  • 18
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • Coppersmith, D. ed., Springer, Heidelberg
    • Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive Secret Sharing or: How to Cope with Perpetual Leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339-352. Springer, Heidelberg (1995)
    • (1995) CRYPTO 1995. LNCS , vol.963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 20
    • 49049095073 scopus 로고    scopus 로고
    • Improving the round complexity of VSS in point-to-point networks
    • Aceto, L., Damgård, I., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A., Walukiewicz, I. eds., Springer, Heidelberg
    • Katz, J., Koo, C.-Y., Kumaresan, R.: Improving the Round Complexity of VSS in Point-to-Point Networks. In: Aceto, L., Damgård, I., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 499-510. Springer, Heidelberg (2008)
    • (2008) ICALP 2008, Part II. LNCS , vol.5126 , pp. 499-510
    • Katz, J.1    Koo, C.-Y.2    Kumaresan, R.3
  • 21
    • 78650823137 scopus 로고    scopus 로고
    • The round complexity of verifiable secret sharing: The statistical case
    • Abe, M. ed., Springer, Heidelberg
    • Kumaresan, R., Patra, A., Rangan, C. P.: The Round Complexity of Verifiable Secret Sharing: The Statistical Case. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 431-447. Springer, Heidelberg (2010)
    • (2010) ASIACRYPT 2010. LNCS , vol.6477 , pp. 431-447
    • Kumaresan, R.1    Patra, A.2    Rangan, C.P.3
  • 22
    • 0141544069 scopus 로고    scopus 로고
    • Perfect zero-knowledge arguments for NP using any one-way permutation
    • Naor, M., Ostrovsky, R., Venkatesan, R., Yung, M.: Perfect Zero-Knowledge Arguments for P Using Any One-Way Permutation. J. Cryptology 11(2), 87-108(1998) (Pubitemid 128728046)
    • (1998) Journal of Cryptology , vol.11 , Issue.2 , pp. 87-108
    • Naor, M.1
  • 23
    • 70350348919 scopus 로고    scopus 로고
    • The round complexity of verifiable secret sharing revisited
    • Halevi, S. ed., Springer, Heidelberg
    • Patra, A., Choudhary, A., Rabin, T., Rangan, C. P.: The Round Complexity of Verifiable Secret Sharing Revisited. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 487-504. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009. LNCS , vol.5677 , pp. 487-504
    • Patra, A.1    Choudhary, A.2    Rabin, T.3    Rangan, C.P.4
  • 24
    • 70350627331 scopus 로고    scopus 로고
    • Efficient asynchronous byzantine agreement with optimal resilience
    • Patra, A., Choudhary, A., Rangan, C. P.: Efficient Asynchronous Byzantine Agreement with Optimal Resilience. In: ACM PODC 2009, pp. 92-101(2009)
    • (2009) ACM PODC 2009 , pp. 92-101
    • Patra, A.1    Choudhary, A.2    Rangan, C.P.3
  • 25
    • 78149273742 scopus 로고    scopus 로고
    • Efficient statistical asynchronous verifiable secret sharing with optimal resilience
    • Kurosawa, K. ed., Springer, Heidelberg
    • Patra, A., Choudhary, A., Rangan, C. P.: Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience. In: Kurosawa, K. (ed.) Information Theoretic Security. LNCS, vol. 5973, pp. 74-92. Springer, Heidelberg (2010)
    • (2010) Information Theoretic Security. LNCS , vol.5973 , pp. 74-92
    • Patra, A.1    Choudhary, A.2    Rangan, C.P.3
  • 26
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • Davies, D. W. ed., Springer, Heidelberg
    • Pedersen, T. P.: A Threshold Cryptosystem Without a Trusted Party. In: Davies, D. W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522-526. Springer, Heidelberg (1991)
    • (1991) EUROCRYPT 1991. LNCS , vol.547 , pp. 522-526
    • Pedersen, T.P.1
  • 27
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Feigenbaum, J. ed., Springer, Heidelberg
    • Pedersen, T. P.: Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
    • (1992) CRYPTO 1991. LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 28
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority (extended abstract)
    • Rabin, T., Ben-Or, M.: Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract). In: ACM STOC 1989, pp. 73-85(1989)
    • (1989) ACM STOC 1989 , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 30
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to Share a Secret. Commun. ACM 22(11), 612-613(1979)
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.