Publicly verifiable secret sharing scheme and its application with almost optimal information rate
暂无分享,去创建一个
[1] Tatsuaki Okamoto,et al. A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications , 1998, EUROCRYPT.
[2] Brent Waters,et al. Attribute-Based Encryption for Circuits from Multilinear Maps , 2012, CRYPTO.
[3] Danny Dolev,et al. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.
[4] L. Harn. Efficient sharing (broadcasting) of multiple secrets , 1995 .
[5] Mehdi Tibouchi,et al. Cryptanalysis of GGH15 Multilinear Maps , 2016, CRYPTO.
[6] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[7] Ron Steinfeld,et al. GGHLite: More Efficient Multilinear Maps from Ideal Lattices , 2014, IACR Cryptol. ePrint Arch..
[8] Jie Zhang,et al. Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications , 2015, Future Gener. Comput. Syst..
[9] Guoping Jiang,et al. A Verifiable Multi-recipient Encryption Scheme from Multilinear Maps , 2014, 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[10] Adi Shamir,et al. How to share a secret , 1979, CACM.
[11] Changgen Peng,et al. A practical publicly verifiable secret sharing scheme based on bilinear pairing , 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification.
[12] Jean-Sébastien Coron,et al. Practical Multilinear Maps over the Integers , 2013, CRYPTO.
[13] Joseph Y. Halpern,et al. Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.
[14] Yuh-Min Tseng,et al. Publicly verifiable multi-secret sharing scheme from bilinear pairings , 2013, IET Inf. Secur..
[15] Yun Song,et al. The optimal information rate of perfect secret sharing schemes , 2011, 2011 International Conference on Business Management and Electronic Information.
[16] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[17] Ernest F. Brickell,et al. On the classification of ideal secret sharing schemes , 1989, Journal of Cryptology.
[18] Brice Minaud,et al. Cryptanalysis of the New CLT Multilinear Map over the Integers , 2016, EUROCRYPT.
[19] Berry Schoenmakers,et al. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.
[20] Mahabir Prasad Jhanwar,et al. Paillier-based publicly verifiable (non-interactive) secret sharing , 2014, Des. Codes Cryptogr..
[21] Mihir Bellare,et al. Verifiable partial key escrow , 1997, CCS '97.
[22] Ilya Mironov,et al. Publicly Verifiable Secret Sharing for Cloud-Based Key Management , 2011, INDOCRYPT.
[23] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[24] Alfredo De Santis,et al. On the size of shares for secret sharing schemes , 1991, Journal of Cryptology.
[25] Joseph Y. Halpern,et al. Ra-tional secret sharing and multiparty computation , 2004, STOC 2004.
[26] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[27] Yongge Wang,et al. Efficient secret sharing schemes achieving optimal information rate , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).