메뉴 건너뛰기




Volumn 2139 LNCS, Issue , 2001, Pages 503-523

On the cost of reconstructing a secret, or VSS with optimal reconstruction phase

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; OUTAGES;

EID: 84880905357     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44647-8_30     Document Type: Conference Paper
Times cited : (43)

References (15)
  • 1
    • 84933507780 scopus 로고
    • Efficient multiparty protocols using circuit randomization
    • LNCS 576 Springer-Verlag
    • D. Beaver. Efficient multiparty protocols using circuit randomization. In CRYPTO '91, LNCS 576, pages 420-432. Springer-Verlag, 1992.
    • (1992) CRYPTO '91 , pp. 420-432
    • Beaver, D.1
  • 4
    • 33746088658 scopus 로고    scopus 로고
    • Efficient multiparty computations secure against an adaptive adversary
    • LNCS 1592. Springer-Verlag
    • R. Cramer, I. Damgard, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary. In EUROCRYPT '99, LNCS 1592. Springer-Verlag, 1999.
    • (1999) EUROCRYPT '99
    • Cramer, R.1    Damgard, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 5
    • 0002626155 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • LNCS 1807. Springer-Verlag
    • R. Cramer, I. Damgaard, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In EUROCRYPT 2000, LNCS 1807. Springer-Verlag, 2000.
    • (2000) EUROCRYPT 2000
    • Cramer, R.1    Damgaard, I.2    Maurer, U.3
  • 9
    • 0030693496 scopus 로고    scopus 로고
    • Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)
    • M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract). In 16th ACM Symposium on Principles of Distributed Computing, pages 25-34, 1997.
    • (1997) 16th ACM Symposium on Principles of Distributed Computing , pp. 25-34
    • Hirt, M.1    Maurer, U.2
  • 12
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority (extended abstract)
    • T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In 21th Annual ACM Symposium on the Theory of Computing, pages 73-85, 1989.
    • (1989) 21th Annual ACM Symposium on the Theory of Computing , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 14
    • 84983269168 scopus 로고
    • Authentication theory/coding theory
    • LNCS 196 Springer-Verlag
    • G.J. Simmons. Authentication theory/coding theory. In CRYPTO '84, LNCS 196, pages 411-431. Springer-Verlag, 1985.
    • (1985) CRYPTO '84 , pp. 411-431
    • Simmons, G.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.