New results and applications for multi-secret sharing schemes
暂无分享,去创建一个
Germán Sáez | Javier Herranz | Alexandre Ruiz | Javier Herranz | G. Sáez | A. Ruiz | Germán Sáez | Alexandre Ruiz
[1] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[4] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[5] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[6] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[7] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[8] Giovanni Di Crescenzo,et al. Multi-Secret Sharing Schemes , 1994, CRYPTO.
[9] J. He,et al. Multisecret-sharing scheme based on one-way function , 1995 .
[10] Keith M. Martin,et al. A Construction for Multisecret Threshold Schemes , 1996, Des. Codes Cryptogr..
[11] Victor Shoup,et al. Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.
[12] Jean-Sébastien Coron,et al. On the Exact Security of Full Domain Hash , 2000, CRYPTO.
[13] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[14] Rosario Gennaro,et al. Securing Threshold Cryptosystems against Chosen Ciphertext Attack , 1998, Journal of Cryptology.
[15] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[16] David Pointcheval,et al. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes , 2001, Public Key Cryptography.
[17] Alexandra Boldyreva,et al. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .
[18] Germán Sáez,et al. Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures , 2003, Financial Cryptography.
[19] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[20] Antoine Joux,et al. Separating Decision Diffie–Hellman from Computational Diffie–Hellman in Cryptographic Groups , 2003, Journal of Cryptology.
[21] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[22] Barbara Masucci. Sharing Multiple Secrets: Models, Schemes and Analysis , 2006, Des. Codes Cryptogr..
[23] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[24] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.
[25] Y. Yeh,et al. Dynamic Multi-Secret Sharing Scheme , 2008 .
[26] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[27] László Csirmaz. How to share secrets simultaneously , 2011, IACR Cryptol. ePrint Arch..
[28] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[29] Gábor Tardos,et al. On-line secret sharing , 2011, Designs, Codes and Cryptography.
[30] Javier Herranz,et al. Short Attribute-Based Signatures for Threshold Predicates , 2012, CT-RSA.
[31] Javier Herranz,et al. Attribute-based encryption schemes with constant-size ciphertexts , 2012, Theor. Comput. Sci..