Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes
暂无分享,去创建一个
[1] Ravi Kumar,et al. A sieve algorithm for the shortest lattice vector problem , 2001, STOC '01.
[2] Atsuko Miyaji,et al. Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme , 2001, ACISP.
[3] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[4] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[5] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[6] Igor E. Shparlinski,et al. Sparse polynomial approximation in finite fields , 2001, STOC '01.
[7] J. Rosser,et al. Approximate formulas for some functions of prime numbers , 1962 .
[8] László Babai,et al. On Lovász’ lattice reduction and the nearest lattice point problem , 1986, Comb..
[9] Igor E. Shparlinski,et al. Noisy Chinese remaindering in the Lee norm , 2004, J. Complex..
[10] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[11] Sushil Jajodia,et al. Redistributing Secret Shares to New Access Structures and Its Applications , 1997 .
[12] Keith M. Martin,et al. Updating the parameters of a threshold scheme by minimal broadcast , 2005, IEEE Transactions on Information Theory.
[13] Dana Ron,et al. Chinese remaindering with errors , 1999, STOC '99.
[14] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[15] Reihaneh Safavi-Naini,et al. Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures , 1999, Comput. J..
[16] Alfredo De Santis,et al. Fully Dynamic Secret Sharing Schemes , 1993, Theor. Comput. Sci..
[17] P. Shiu,et al. Geometric and analytic number theory , 1991 .
[18] Luisa Gargano,et al. A Note on Secret Sharing Schemes , 1993 .
[19] Dan Boneh,et al. Finding smooth integers in short intervals using CRT decoding , 2000, STOC '00.
[20] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[21] Bart Preneel,et al. On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem , 2002, Public Key Cryptography.
[22] Amin Shokrollahi,et al. List Decoding of Algebraic-Geometric Codes , 1999, IEEE Trans. Inf. Theory.
[23] L. Lovász,et al. Geometric Algorithms and Combinatorial Optimization , 1981 .
[24] Josef Pieprzyk,et al. Changing Thresholds in the Absence of Secure Channels , 1999, Aust. Comput. J..
[25] Maurice Mignotte,et al. How to Share a Secret? , 1982, EUROCRYPT.
[26] Adi Shamir,et al. How to share a secret , 1979, CACM.
[27] R. Kannan. ALGORITHMIC GEOMETRY OF NUMBERS , 1987 .
[28] Keith M. Martin,et al. A combinatorial interpretation of ramp schemes , 1996, Australas. J Comb..