메뉴 건너뛰기




Volumn 7, Issue 3, 2013, Pages 239-246

Publicly verifiable multi-secret sharing scheme from bilinear pairings

Author keywords

[No Author keywords available]

Indexed keywords

BILINEAR PAIRING; DIFFIE HELLMAN; DIFFIE-HELLMAN ASSUMPTION; ELECTRONIC CASH; ELECTRONIC VOTING; MULTI-SECRET SHARING; MULTI-SECRET SHARING SCHEME; PUBLICLY VERIFIABLE;

EID: 84883433659     PISSN: 17518709     EISSN: 17518717     Source Type: Journal    
DOI: 10.1049/iet-ifs.2012.0105     Document Type: Article
Times cited : (28)

References (39)
  • 1
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: 'How to share a secret', Commun. ACM, 1979, 22, (11), pp. 612-613
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 4
    • 77958582062 scopus 로고    scopus 로고
    • Strong (n, t, n) verifiable secret sharing scheme
    • Harn, L., Lin, C.: 'Strong (n, t, n) verifiable secret sharing scheme', Inf. Sci., 2010, 180, (16), pp. 3059-3064
    • (2010) Inf. Sci. , vol.180 , Issue.16 , pp. 3059-3064
    • Harn, L.1    Lin, C.2
  • 5
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • (LNCS, 576)
    • Pedersen, T.P.: 'Non-interactive and information-theoretic secure verifiable secret sharing'. Proc. CRYPTO'92, 1992 (LNCS, 576), pp. 129-140
    • (1992) Proc. CRYPTO'92 , pp. 129-140
    • Pedersen, T.P.1
  • 6
    • 84957685616 scopus 로고    scopus 로고
    • A practical and provably secure scheme for publicly verifiable secret sharing and its applications
    • (LNCS, 1403)
    • Fujisaki, E., Okamoto, T.: 'A practical and provably secure scheme for publicly verifiable secret sharing and its applications'. Proc. EUROCRYPT'98, 1998 (LNCS, 1403), pp. 32-46
    • (1998) Proc. EUROCRYPT'98 , pp. 32-46
    • Fujisaki, E.1    Okamoto, T.2
  • 8
    • 79956316924 scopus 로고    scopus 로고
    • Apractical (non-interactive) publicly verifiable secret sharing scheme
    • (LNCS, 6672)
    • Jhanwar, M.:'Apractical (non-interactive) publicly verifiable secret sharing scheme'. Proc. ISPEC2011, 2011 (LNCS, 6672), pp. 273-287
    • (2011) Proc. ISPEC2011 , pp. 273-287
    • Jhanwar, M.1
  • 9
    • 84957080948 scopus 로고    scopus 로고
    • A simple publicly verifiable secret sharing scheme and its application to electronic voting
    • (LNCS, 1666)
    • Schoenmakers, B.: 'A simple publicly verifiable secret sharing scheme and its application to electronic voting'. Proc. CRYPTO'99, 1999 (LNCS, 1666), pp. 148-164
    • (1999) Proc. CRYPTO'99 , pp. 148-164
    • Schoenmakers, B.1
  • 10
    • 84947917119 scopus 로고    scopus 로고
    • Public verifiable secret sharing
    • (LNCS, 1070)
    • Stadler, M.: 'Public verifiable secret sharing'. Proc. EUROCRYPT'96, 1996 (LNCS, 1070), pp. 190-199
    • (1996) Proc. EUROCRYPT'96 , pp. 190-199
    • Stadler, M.1
  • 11
    • 84858245424 scopus 로고    scopus 로고
    • Publicly verifiable secret sharing schemes using bilinear pairings
    • Tian, Y., Peng, C., Ma, J.: 'Publicly verifiable secret sharing schemes using bilinear pairings', Int. J. Netw. Sec., 2012, 14, (3), pp. 142-148
    • (2012) Int. J. Netw. Sec. , vol.14 , Issue.3 , pp. 142-148
    • Tian, Y.1    Peng, C.2    Ma, J.3
  • 12
    • 79551705094 scopus 로고    scopus 로고
    • A pairing-based publicly verifiable secret sharing scheme
    • Wu, T.Y., Tseng, Y.M.: 'A pairing-based publicly verifiable secret sharing scheme', J. Syst. Sci. Complexity, 2011, 24, (1), pp. 186-194
    • (2011) J. Syst. Sci. Complexity , vol.24 , Issue.1 , pp. 186-194
    • Wu, T.Y.1    Tseng, Y.M.2
  • 18
    • 0034504833 scopus 로고    scopus 로고
    • A practical (t, n) multi-secret sharing scheme
    • Chien, H.Y., Jan, J.K., Tseng, Y.M.: 'A practical (t, n) multi-secret sharing scheme', IEICE Trans. Fundam., 2000, E83-A, (12), pp. 2762-2765
    • (2000) IEICE Trans. Fundam. , vol.E83-A , Issue.12 , pp. 2762-2765
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 19
    • 0028498073 scopus 로고
    • Multi secret-sharing scheme based on one-way function
    • He, J., Dawson, E.: 'Multi secret-sharing scheme based on one-way function', Electron. Lett., 1995, 30, (19), pp. 1591-1592
    • (1995) Electron. Lett. , vol.30 , Issue.19 , pp. 1591-1592
    • He, J.1    Dawson, E.2
  • 20
    • 1542402281 scopus 로고    scopus 로고
    • A (t, n) multi-secret sharing scheme
    • Yang, C.C., Chang, T.Y., Hwang, M.S.: 'A (t, n) multi-secret sharing scheme', Appl. Math. Comput., 2004, 151, (2), pp. 483-490
    • (2004) Appl. Math. Comput. , vol.151 , Issue.2 , pp. 483-490
    • Yang, C.C.1    Chang, T.Y.2    Hwang, M.S.3
  • 21
    • 78049242904 scopus 로고    scopus 로고
    • A verifiable multi-secret sharing scheme based on cellular automata
    • Eslami, Z., Ahmadabadi, J.: 'A verifiable multi-secret sharing scheme based on cellular automata', Inf. Sci., 2010, 180, (15), pp. 2889-2894
    • (2010) Inf. Sci. , vol.180 , Issue.15 , pp. 2889-2894
    • Eslami, Z.1    Ahmadabadi, J.2
  • 22
    • 25644460988 scopus 로고    scopus 로고
    • A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
    • Shao, J., Cao, Z.: 'A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme', Appl. Math. Comput., 2005, 168, (1), pp. 135-140
    • (2005) Appl. Math. Comput. , vol.168 , Issue.1 , pp. 135-140
    • Shao, J.1    Cao, Z.2
  • 23
    • 33751101633 scopus 로고    scopus 로고
    • A practical verifiable multi-secret sharing scheme
    • Zhao, J., Zhang, J., Zhao, R.: 'A practical verifiable multi-secret sharing scheme', Comput. Stand. and Interfaces, 2007, 29, (1), pp. 138-141
    • (2007) Comput. Stand. and Interfaces , vol.29 , Issue.1 , pp. 138-141
    • Zhao, J.1    Zhang, J.2    Zhao, R.3
  • 24
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • Menezes, A., Okamoto, T., Vanstone, S.: 'Reducing elliptic curve logarithms to logarithms in a finite field', IEEE Trans. Inf. Theory, 1993, 39, (5), pp. 1639-1646
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.5 , pp. 1639-1646
    • Menezes, A.1    Okamoto, T.2    Vanstone, S.3
  • 25
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite diffie-hellman
    • Joux, A.: 'A one round protocol for tripartite Diffie-Hellman', J. Cryptol., 2004, 17, (4), pp. 263-276
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 263-276
    • Joux, A.1
  • 26
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D., Franklin, M.: 'Identity-based encryption from the Weil pairing', SIAM J. Comput., 2003, 32, (3), pp. 586-615
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 27
    • 23044435711 scopus 로고    scopus 로고
    • Short signature from the weil pairing
    • Boneh, D., Lynn, B., Shacham, H.: 'Short signature from the Weil pairing', J. Cryptol., 2004, 17, (4), pp. 297-319
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 28
    • 84946832010 scopus 로고    scopus 로고
    • Supersingular curves in cryptography
    • (LNCS, 2248)
    • Galbraith, S.D.: 'Supersingular curves in cryptography'. Proc. ASIACRYPT, 2001 (LNCS, 2248), pp. 495-513
    • (2001) Proc. ASIACRYPT , pp. 495-513
    • Galbraith, S.D.1
  • 29
    • 84937426999 scopus 로고    scopus 로고
    • Supersingular abelian varieties in cryptology
    • (LNCS, 2442)
    • Rubin, K., Silverberg, A.: 'Supersingular abelian varieties in cryptology'. Proc. CRYPTO'02, 2002 (LNCS, 2442), pp. 336-353
    • (2002) Proc. CRYPTO'02 , pp. 336-353
    • Rubin, K.1    Silverberg, A.2
  • 31
    • 34347393777 scopus 로고    scopus 로고
    • Identity-based key agreement protocols from pairings
    • Chen, L., Cheng, Z., Smart, N.P.: 'Identity-based key agreement protocols from pairings', Int. J. Inf. Secur., 2007, 6, (4), pp. 213-241
    • (2007) Int. J. Inf. Secur. , vol.6 , Issue.4 , pp. 213-241
    • Chen, L.1    Cheng, Z.2    Smart, N.P.3
  • 32
    • 71149103376 scopus 로고    scopus 로고
    • An efficient and provably secure ID-based signature scheme with batch verifications
    • Tseng, Y.M., Wu, T.Y., Wu, J.D.: 'An efficient and provably secure ID-based signature scheme with batch verifications', Int. J. Innov. Comput. Inf. Control, 2009, 5, (11), pp. 3911-3922
    • (2009) Int. J. Innov. Comput. Inf. Control , vol.5 , Issue.11 , pp. 3911-3922
    • Tseng, Y.M.1    Wu, T.Y.2    Wu, J.D.3
  • 33
    • 77955703761 scopus 로고    scopus 로고
    • An ID-based mutual authentication and key exchange protocol for low-power mobile devices
    • Wu, T.Y., Tseng, Y.M.: 'An ID-based mutual authentication and key exchange protocol for low-power mobile devices', Comput. J., 2010, 53, (7), pp. 1062-1070
    • (2010) Comput. J. , vol.53 , Issue.7 , pp. 1062-1070
    • Wu, T.Y.1    Tseng, Y.M.2
  • 34
    • 77955659710 scopus 로고    scopus 로고
    • An efficient user authentication and key exchange protocol for mobile client-server environment
    • Wu, T.Y., Tseng, Y.M.: 'An efficient user authentication and key exchange protocol for mobile client-server environment', Comput. Netw., 2010, 54, (9), pp. 1520-1530
    • (2010) Comput. Netw. , vol.54 , Issue.9 , pp. 1520-1530
    • Wu, T.Y.1    Tseng, Y.M.2
  • 35
    • 84863621901 scopus 로고    scopus 로고
    • A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants
    • Wu, T.Y., Tseng, Y.M., Tsai, T.T.: 'A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants', Comput. Netw., 2012, 56, pp. 2994-3006
    • (2012) Comput. Netw. , vol.56 , pp. 2994-3006
    • Wu, T.Y.1    Tseng, Y.M.2    Tsai, T.T.3
  • 36
    • 35048854587 scopus 로고    scopus 로고
    • An efficient signature scheme from bilinear pairings and its applications
    • (LNCS, 2947)
    • Zhang, F., Safavi-Naini, R., Susilo, W.: 'An efficient signature scheme from bilinear pairings and its applications'. Proc. Public Key Cryptography (PKC 2004), 2004 (LNCS, 2947), pp. 277-290
    • (2004) Proc. Public Key Cryptography (PKC 2004) , pp. 277-290
    • Zhang, F.1    Safavi-Naini, R.2    Susilo, W.3
  • 38
    • 25844432081 scopus 로고    scopus 로고
    • A robust multi-party key agreement protocol resistant to malicious participants
    • Tseng, Y.M.: 'A robust multi-party key agreement protocol resistant to malicious participants', Comput. J., 2005, 48, (4), pp. 480-487
    • (2005) Comput. J. , vol.48 , Issue.4 , pp. 480-487
    • Tseng, Y.M.1
  • 39
    • 84873031582 scopus 로고    scopus 로고
    • An efficient key-management scheme for hierarchical access control in e-medicine system
    • Wu, S., Chen, K.: 'An efficient key-management scheme for hierarchical access control in e-medicine system', J. Med. Syst., 2012, 36, pp. 2325-2337
    • (2012) J. Med. Syst. , vol.36 , pp. 2325-2337
    • Wu, S.1    Chen, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.