메뉴 건너뛰기




Volumn 1758, Issue , 2000, Pages 200-214

Unconditionally secure proactive secret sharing scheme with combinatorial structures

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84944048103     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46513-8_15     Document Type: Conference Paper
Times cited : (58)

References (26)
  • 2
    • 85034837254 scopus 로고
    • Secret sharing homomorphisms: Keeping shares of a secret secret, Advances
    • LNCS 263
    • J. C. Benaloh, Secret sharing homomorphisms: keeping shares of a secret secret, Advances in Cryptology-Crypto'86, LNCS 263, 1987, 251-260.
    • (1987) Cryptology-Crypto'86 , pp. 251-260
    • Benaloh, J.C.1
  • 5
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • LNCS 209
    • R. Blom, An optimal class of symmetric key generation systems, Eurocrypt'84, LNCS 209, (1985), 335-338.
    • (1985) Eurocrypt'84 , pp. 335-338
    • Blom, R.1
  • 6
    • 84984842401 scopus 로고
    • Maintaining security in the presence of transient faults
    • LNCS 839
    • R. Canetti and A. Herzberg, Maintaining security in the presence of transient faults, Crypto'94, LNCS 839, 1994.
    • (1994) Crypto'94
    • Canetti, R.1    Herzberg, A.2
  • 13
    • 71149116146 scopus 로고
    • Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems
    • O. Goldreich, S. Micali and A. Wigderson, Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems, Journal of the ACM, 38(1991), 691-729.
    • (1991) Journal of the ACM , vol.38 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 15
    • 0000299804 scopus 로고    scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • LNCS 963339-352
    • A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung, Proactive secret sharing or: How to cope with perpetual leakage, Crypto'95, LNCS 963339-352.
    • Crypto'95
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 16
    • 84921169347 scopus 로고
    • A protocol to set up shared secret schemes without the assistance of a mutually trusted party
    • LNCS 473
    • I. Ingemarsson and G. J. Simmons, A protocol to set up shared secret schemes without the assistance of a mutually trusted party, Eurocrypt'90, LNCS 473, 1990, 266-282.
    • (1990) Eurocrypt'90 , pp. 266-282
    • Ingemarsson, I.1    Simmons, G.J.2
  • 19
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secret sharing, Advances
    • LNCS 576
    • T. P. Pedersen, Non-interactive and information-theoretic secret sharing, Advances in Cryptology - Crypto'91, LNCS 576, 1991, 129-140.
    • (1991) Cryptology - Crypto'91 , pp. 129-140
    • Pedersen, T.P.1
  • 20
    • 0028542745 scopus 로고
    • Robust sharing of secrets when the dealer is honest or faulty
    • T. Rabin, Robust sharing of secrets when the dealer is honest or faulty, Journal of the ACM, 41(1994), 1089-1109.
    • (1994) Journal of the ACM , vol.41 , pp. 1089-1109
    • Rabin, T.1
  • 21
    • 84957689308 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive RSA
    • LNCS 1462
    • T. Rabin, A simplified approach to threshold and proactive RSA, Crypto'98, LNCS 1462, 1998, 89-104.
    • (1998) Crypto'98 , pp. 89-104
    • Rabin, T.1
  • 23
    • 0018545449 scopus 로고
    • How to share a secret, Commun
    • A. Shamir, How to share a secret, Commun. ACM, 22(1979), 612-613.
    • (1979) ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 24
    • 84944090425 scopus 로고    scopus 로고
    • An application of covering designs: Determining the maximum consistent set of shares
    • to appear
    • R. S. Rees, D. R. Stinson, R. Wei and G. H. J. van Rees, An application of covering designs: determining the maximum consistent set of shares in a threshold scheme, Ars Combin., to appear.
    • A Threshold Scheme, Ars Combin
    • Rees, R.S.1    Stinson, D.R.2    Wei, R.3    Van Rees, G.H.4
  • 26
    • 0024141971 scopus 로고
    • How to share a secret with cheaters
    • M. Tompa and H. Woll, How to share a secret with cheaters, Journal of Cryptology, 1(1988), 133-138.
    • (1988) Journal of Cryptology , vol.1 , pp. 133-138
    • Tompa, M.1    Woll, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.