메뉴 건너뛰기




Volumn 963, Issue , 1995, Pages 410-423

t-cheater identifiable (k, n) threshold secret sharing schemes

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION THEORY;

EID: 84957630266     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44750-4_33     Document Type: Conference Paper
Times cited : (60)

References (16)
  • 1
    • 0018545449 scopus 로고
    • How to share a secret
    • A.Shamir, How to share a secret, Comm.ACM, 22(1979), pp.612-613.
    • (1979) Comm.ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 3
    • 0019608784 scopus 로고
    • On sharing secrets and Reed-Solomon codes
    • R.J.McEliece and D.V.Sarwate, On sharing secrets and Reed-Solomon codes, Comm.ACM, 24(1981), pp.583-584.
    • (1981) Comm.ACM , vol.24 , pp. 583-584
    • McEliece, R.J.1    Sarwate, D.V.2
  • 4
    • 0005180192 scopus 로고
    • Robust shared secret schemes or "how to be sure you have the right answer even though you don't know the question"
    • G.Simmons, Robust shared secret schemes or "how to be sure you have the right answer even though you don't know the question," Congr.Numer., 68(1989), pp.215- 248.
    • (1989) Congr.Numer , vol.68 , pp. 215-248
    • Simmons, G.1
  • 6
    • 0005167951 scopus 로고
    • The Detection of Cheaters in Threshold Schemes
    • Nov
    • E.F.Brickell and D.R.Stinson, The Detection of Cheaters in Threshold Schemes, SIAM J. DISC. MATH, Vol.4, No.4, Nov.1991, pp.502-510.
    • (1991) SIAM J. DISC. MATH , vol.4 , Issue.4 , pp. 502-510
    • Brickell, E.F.1    Stinson, D.R.2
  • 7
    • 0024141971 scopus 로고
    • How to share a secret with cheaters
    • M.Tompa and H.Woll, How to share a secret with cheaters, Journal of Cryptology, vol.l(1988), pp.133-138.
    • (1988) Journal of Cryptology , vol.1 , pp. 133-138
    • Tompa, M.1    Woll, H.2
  • 8
    • 85028775273 scopus 로고
    • Size of Shares and Probability of Cheating in Threshold Schemes
    • Lecture Notes in Computer Science, LNCS 765, Springer Verlag
    • Marco Carpentieri, Alfredo De Santis and Ugo Vaccaro, Size of Shares and Probability of Cheating in Threshold Schemes, Proceedings of Eurocrypt'93, Lecture Notes in Computer Science, LNCS 765, Springer Verlag (1993), pp.118-125.
    • (1993) Proceedings of Eurocrypt'93 , pp. 118-125
    • Carpentieri, M.1    De Santis, A.2    Vaccaro, U.3
  • 10
    • 85029546799 scopus 로고
    • On the size of shares for secret sharing schemes
    • Lecture Notes in Computer Science, LNCS 576, Springer Verlag
    • R.M.Capocelli, A.De Santis, L.Gargano and U.Vaccaro, On the size of shares for secret sharing schemes, Proceedings of Crypto'91, Lecture Notes in Computer Science, LNCS 576, Springer Verlag (1991), pp.101-113.
    • (1991) Proceedings of Crypto'91 , pp. 101-113
    • Capocelli, R.M.1    De Santis, A.2    Gargano, L.3    Vaccaro, U.4
  • 11
    • 84957645204 scopus 로고
    • Combinatorial interpretation of secret sharing schemes
    • K.Kurosawa and K.Okada, Combinatorial interpretation of secret sharing schemes, In Pre-Proceedings of Asiacrypt'94 (1994), pp.38-48.
    • (1994) Pre-Proceedings of Asiacrypt'94 , pp. 38-48
    • Kurosawa, K.1    Okada, K.2
  • 12
    • 0003038453 scopus 로고
    • A survey of Information Authentication, in Contemporary Cryptology
    • ed. G.J.Simmons, IEEE Press, New York
    • G.J.Simmons, A survey of Information Authentication, in Contemporary Cryptology, The science of information integrity, ed. G.J.Simmons, IEEE Press, New York (1992).
    • (1992) The science of information integrity
    • Simmons, G.J.1
  • 13
    • 0347818475 scopus 로고
    • Message authentication: A game on hypergraphs
    • G.J.Simmons, Message authentication: a game on hypergraphs, Congr. Numer. 45 (1984), pp.161-192.
    • (1984) Congr. Numer , vol.45 , pp. 161-192
    • Simmons, G.J.1
  • 14
    • 0023828936 scopus 로고
    • Some constructions and bounds for authentication codes
    • D.R.Stinson, Some constructions and bounds for authentication codes, Journal of Cryptology, vol.l (1988), pp.37-51.
    • (1988) Journal of Cryptology , vol.1 , pp. 37-51
    • Stinson, D.R.1
  • 15
    • 0022953155 scopus 로고
    • Cryptography - A selective survey
    • North- Holland (pub.)
    • J.L.Massey, Cryptography - a selective survey, in Digital Communications, North- Holland (pub.) (1986), pp.3-21.
    • (1986) Digital Communications , pp. 3-21
    • Massey, J.L.1
  • 16
    • 0025724776 scopus 로고
    • New Bounds and Constructions for Authentication/Secrecy Codes with Splitting
    • M.De Soete, New Bounds and Constructions for Authentication/Secrecy Codes with Splitting, Journal of Cryptology, vol.3, no.3 (1991), pp.173-186.
    • (1991) Journal of Cryptology , vol.3 , Issue.3 , pp. 173-186
    • De Soete, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.