(t,p)-Threshold Point Function Secret Sharing Scheme Based on Polynomial Interpolation and Its Application
暂无分享,去创建一个
Xiao Li | Mingxing He | Long Lu | Shengke Zeng | Dazeng Yuan
[1] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[2] References , 1971 .
[3] Yuval Ishai,et al. Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[4] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[5] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.
[6] Jeffrey D. Ullman,et al. Principles of Database Systems , 1980 .
[7] Yuval Ishai,et al. Function Secret Sharing , 2015, EUROCRYPT.
[8] Rafail Ostrovsky,et al. Private Information Storage , 1996, IACR Cryptol. ePrint Arch..
[9] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[10] Mark Zhandry,et al. Cutting-Edge Cryptography Through the Lens of Secret Sharing , 2018, TCC.
[11] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.
[13] Yuval Ishai,et al. General constructions for information-theoretic private information retrieval , 2005, J. Comput. Syst. Sci..
[14] Yuval Ishai,et al. Distributed Point Functions and Their Applications , 2014, EUROCRYPT.
[15] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[16] Rafail Ostrovsky,et al. Private Searching on Streaming Data , 2005, CRYPTO.