Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes
暂无分享,去创建一个
[1] László Babai,et al. On Lovász’ lattice reduction and the nearest lattice point problem , 1986, Comb..
[2] Amin Shokrollahi,et al. List Decoding of Algebraic-Geometric Codes , 1999, IEEE Trans. Inf. Theory.
[3] Ron Steinfeld,et al. Lattice-based threshold-changeability for standard CRT secret-sharing schemes , 2006, Finite Fields Their Appl..
[4] Dan Boneh,et al. Finding smooth integers in short intervals using CRT decoding , 2000, STOC '00.
[5] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[6] F. Thorne,et al. Geometry of Numbers , 2017, Algebraic Number Theory.
[7] Maurice Mignotte,et al. How to Share a Secret? , 1982, EUROCRYPT.
[8] R. Kannan. ALGORITHMIC GEOMETRY OF NUMBERS , 1987 .
[9] Keith M. Martin,et al. A combinatorial interpretation of ramp schemes , 1996, Australas. J Comb..
[10] P. Shiu,et al. Geometric and analytic number theory , 1991 .
[11] Luisa Gargano,et al. A Note on Secret Sharing Schemes , 1993 .
[12] M. A. Tsfasman,et al. Decoding of Algebraic-Geometric Codes , 1993, Proceedings. IEEE International Symposium on Information Theory.
[13] Ron Steinfeld,et al. Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes , 2004, IEEE Transactions on Information Theory.
[14] Sushil Jajodia,et al. Redistributing Secret Shares to New Access Structures and Its Applications , 1997 .
[15] Igor E. Shparlinski,et al. Noisy Chinese remaindering in the Lee norm , 2004, J. Complex..
[16] Keith M. Martin,et al. Updating the parameters of a threshold scheme by minimal broadcast , 2005, IEEE Transactions on Information Theory.
[17] Igor E. Shparlinski,et al. Sparse polynomial approximation in finite fields , 2001, STOC '01.
[18] Josef Pieprzyk,et al. Changing Thresholds in the Absence of Secure Channels , 1999, Aust. Comput. J..
[19] Adi Shamir,et al. How to share a secret , 1979, CACM.
[20] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[21] Alfredo De Santis,et al. Fully Dynamic Secret Sharing Schemes , 1993, Theor. Comput. Sci..
[22] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[23] J. G. Pierce,et al. Geometric Algorithms and Combinatorial Optimization , 2016 .
[24] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[25] Reihaneh Safavi-Naini,et al. Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures , 1999, Comput. J..
[26] Bart Preneel,et al. On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem , 2002, Public Key Cryptography.
[27] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[28] Dana Ron,et al. Chinese remaindering with errors , 1999, STOC '99.
[29] Atsuko Miyaji,et al. Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme , 2001, ACISP.
[30] Ravi Kumar,et al. A sieve algorithm for the shortest lattice vector problem , 2001, STOC '01.
[31] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[32] J. Rosser,et al. Approximate formulas for some functions of prime numbers , 1962 .