Linear (k, n) Secret Sharing Scheme with Cheating Detection
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Alfredo De Santis,et al. Size of Shares and Probability of Cheating in Threshold Schemes , 1994, EUROCRYPT.
[3] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[4] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[5] Xian-Mo Zhang,et al. Cheating Prevention in Linear Secret Sharing , 2002, ACISP.
[6] Bart Preneel,et al. Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case , 2003, ACNS.
[7] Satoshi Obana,et al. t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes , 1995, CRYPTO.
[8] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[9] Kaoru Kurosawa,et al. Optimum Secret Sharing Scheme Secure against Cheating , 1996, EUROCRYPT.
[10] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[11] Toshinori Araki. Efficient (k, n) Threshold Secret Sharing Schemes Secure Against Cheating from n-1 Cheaters , 2007, ACISP.
[12] Ueli Maurer,et al. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.
[13] Bart Preneel,et al. Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case , 2003, IACR Cryptol. ePrint Arch..
[14] MARCO CARPENTIERI. A perfect threshold secret sharing scheme to identify cheaters , 1995, Des. Codes Cryptogr..
[15] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[16] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[17] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[18] Lein Harn,et al. Detection and identification of cheaters in (t, n) secret sharing scheme , 2009, Des. Codes Cryptogr..
[19] Hossein Ghodosi,et al. Comments on Harn–Lin’s cheating detection scheme , 2011, Des. Codes Cryptogr..
[20] Carles Padró,et al. Secret Sharing Schemes with Detection of Cheaters for a General Access Structure , 1999, Des. Codes Cryptogr..
[21] Tor Helleseth,et al. Workshop on the theory and application of cryptographic techniques on Advances in cryptology , 1994 .
[22] Yan-Xiao Liu. Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ⩽ [((k - 2)/2)] , 2014, IET Inf. Secur..
[23] Chin-Chen Chang,et al. A novel efficient (t, n) threshold proxy signature scheme , 2006, Inf. Sci..
[24] Satoshi Obana,et al. Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution , 2006, ASIACRYPT.
[25] Satoshi Obana. Almost Optimum t-Cheater Identifiable Secret Sharing Schemes , 2011, EUROCRYPT.