Acknowledgement
본 논문은 2020년도 정부(과학기술정보통신부)의 재원으로 정보통신기획평가원의 지원을 받아 수행된 연구임 (No.2019-0-00411, 블록체인의 개인 콘텐츠 추적과 완전소멸수정을 위한 잊힐 권리 문제 해결)
References
- Yaga, Dylan, et al., "Blockchain technology overview." arXiv preprint arXiv:1906.11078 (2019).
- 병적 별도관리대상자 명단 https://www.privacy.go.kr/wcp/pif/sch/personalInfoFileViewPopup.do?prsnInfoFileId=PIF_000000000712041
- Zheng, Zibin, et al., "An overview of blockchain technology: Architecture, consensus, and future trends." 2017 IEEE International Congress on Big Data (BigData Congress). IEEE, 2017.
- Hong, Jeongdae, et al., "Fair threshold decryption with semi-trusted third parties." Australasian Conference on Information Security and Privacy. Springer, Berlin, Heidelberg, 2009.
- Pedersen, Torben Pryds, "A threshold crypto-system without a trusted party." Workshop on the Theory and Application of of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1991.
- Daemen, Joan, and Vincent Rijmen, The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, 2013.
- ElGamal, Taher, "A public key cryptosystem and a signature scheme based on discrete logarithms." IEEE transactions on information theory 31.4 (1985): 469-472. https://doi.org/10.1109/TIT.1985.1057074
- Shamir, Adi. "How to share a secret." Communications of the ACM 22.11 (1979): 612-613. https://doi.org/10.1145/359168.359176
- Reiter, Michael K., and Kenneth P. Birman, "How to securely replicate services." ACM Transactions on Programming Languages and Systems (TOPLAS) 16.3 (1994): 986-1009. https://doi.org/10.1145/177492.177745
- Gennaro, Rosario, et al., "Robust threshold DSS signatures." International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1996.
- Frankel, Yair, Peter Gemmell, and Moti Yung, "Witness-based cryptographic program checking and robust function sharing." STOC. Vol. 96. No. 47. 1996.
- Gennaro, Rosario, et al., "Robust and efficient sharing of RSA functions." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1996.
- Pedersen, Torben Pryds, "A threshold crypto-system without a trusted party." Workshop on the Theory and Application of of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1991.
- Boneh, Dan, and Matthew Franklin, "Efficient generation of shared RSA keys." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1997.
- Ostrovsky, Rafail, and Moti Yung, "How to withstand mobile virus attacks." PODC. Vol. 91. 1991.
- Herzberg, Amir, et al., "Proactive secret sharing or: How to cope with perpetual leakage." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1995.
- Desmedt, Yvo, and Sushil Jajodia, "Redistributing secret shares to new access structures and its applications", Vol. 148. Technical Report ISSE TR-97-01, George Mason University, 1997.
- Frankel, Yair, et al., "Optimal-resilience proactive public-key cryptosystems." Proce dings 38th Annual Symposium on Foundations of Computer Science. IEEE, 1997.
- C. Gehrmann and Y. Desmedt, 'Truly Anonymous secret sharing', Manuscript.
- Li, Chuan-Ming, Tzonelih Hwang, and Narn-Yih Lee, "Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders." Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1994.
- Desmedt, Yvo, Giovanni Di Crescenzo, and Mike Burmester, "Multiplicative non-abelian sharing schemes and their application to threshold cryptography." International Conference on the Theory and Application of Cryptology. Springer, Berlin, Heidelberg, 1994.
- Alon, Noga, Zvi Galil, and Moti Yung, "Efficient dynamic-resharing "verifiable secret sharing" against mobile adversary." European Symposium on Algorithms. Springer, Berlin, Heidelberg, 1995.
- 병역사항신고 및 공개 파일 https://www.privacy.go.kr/wcp/pif/sch/personalInfoFileViewPopup.do?prsnInfoFileId=PIF_000000000076460.