메뉴 건너뛰기




Volumn 263 LNCS, Issue , 1987, Pages 251-260

Secret sharing homomorphisms: Keeping shares of a secret secret (Extended Abstract)

(1)  Benaloh, Josh Cohen a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 85034837254     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-47721-7_19     Document Type: Conference Paper
Times cited : (262)

References (17)
  • 1
    • 85040155621 scopus 로고
    • Subexponential Algorithm for The Discrete Logarithm Problem
    • San Juan, PR (Oct
    • Adleman, L. “Subexponential Algorithm for The Discrete Logarithm Problem.” Proc.20thIEEE Symp. on Foundations of Computer Science, San Juan, PR (Oct. 1979), 55–60.
    • (1979) Proc.20Thieee Symp. on Foundations of Computer Science , pp. 55-60
    • Adleman, L.1
  • 5
    • 85034841005 scopus 로고
    • A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data
    • Oakland, CA (Apr
    • Blakley, G. and Meadows, C. “A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.” Proc. IEEE Symposium on Computer Security and Privacy, Oakland, CA (Apr. 1985).
    • (1985) Proc. IEEE Symposium on Computer Security and Privacy
    • Blakley, G.1    Meadows, C.2
  • 7
  • 8
    • 0003654886 scopus 로고
    • TR-454, Yale University, Departement of Computer Science, New Haven, CT (Feb
    • Cohen, J. “Improving Privacy in Cryptographic Elections.” TR-454, Yale University, Departement of Computer Science, New Haven, CT (Feb. 1986).
    • (1986) Improving Privacy in Cryptographic Elections
    • Cohen, J.1
  • 11
    • 85034638281 scopus 로고
    • Encrypting Problem Instances or Can You Take Advantage of Someone Without Having to Trust Him
    • Santa Barbara, CA (Aug, Published as Advances in Cryptology, ed. by H. Williams in Lecture Notes in Computer Science, ed. by G. Goos and J. Hartmanis. Springer-Verlag, New York
    • Feigenbaum, J. “Encrypting Problem Instances or Can You Take Advantage of Someone Without Having to Trust Him”, Proc. Crypto’ 85, Santa Barbara, CA (Aug. 1985), 477–488. Published as Advances in Cryptology, ed. by H. Williams in Lecture Notes in Computer Science, vol. 218, ed. by G. Goos and J. Hartmanis. Springer-Verlag, New York (1985).
    • (1985) Proc. Crypto’ 85 , vol.218 , pp. 477-488
    • Feigenbaum, J.1
  • 15
    • 85023433586 scopus 로고
    • Generalized Linear Threshold Scheme
    • Santa Barbara, CA (Aug, Published as Advances in Cryptology, ed. by G. Blakely and D. Chaum in Lecture Notes in Computer Science, ed. by G. Goos and J. Hartmanis. Springer-Verlag, New York
    • Kothari, S. “Generalized Linear Threshold Scheme.” Proc. Crypto’ 84, Santa Barbara, CA (Aug. 1984), 231–241. Published as Advances in Cryptology, ed. by G. Blakely and D. Chaum in Lecture Notes in Computer Science, vol. 196, ed. by G. Goos and J. Hartmanis. Springer-Verlag, New York (1985).
    • (1984) Proc. Crypto’ 84 , vol.196 , pp. 231-241
    • Kothari, S.1
  • 16
    • 84919085619 scopus 로고
    • An Improved Algorithm for Computing Logarithms Over GF(2) and Its Cryptographic Significance.”
    • Jan
    • Pohlig, S. and Hellman, M. “An Improved Algorithm for Computing Logarithms Over GF(2) and Its Cryptographic Significance.” IEEE Trans. on Information Theory 24,1 (Jan. 1978), 106–110.
    • (1978) IEEE Trans. on Information Theory , vol.24 , Issue.1 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 17
    • 0005301490 scopus 로고
    • On Data Banks and Privacy Homomorphisms
    • ed. by R. A. DeMillo, et al. Academic Press, New York
    • Rivest, R., Adleman, L., and Dertouzos, M. “On Data Banks and Privacy Homomorphisms.” Foundations of Secure Computation, ed. by R. A. DeMillo, et al. Academic Press, New York (1978), 169–179.
    • (1978) Foundations of Secure Computation , pp. 169-179
    • Rivest, R.1    Adleman, L.2    Dertouzos, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.