Acknowledgement
이 논문은 2023년도 정부(과학기술정보통신부)의 재원으로 정보통신기획평가원의 지원을 받아 수행된 연구임(No.2021-0-00590, 대규모 노드에서 블록단위의 효율적인 거래 확정을 위한 최종성 보장 기술개발).
References
- A. Shamir, "How to share a secret," Communications of the ACM, Vol.22, No.11, pp.612-613, 1979. https://doi.org/10.1145/359168.359176
- M. Carpentieri, "A perfect threshold secret sharing scheme to identify cheaters," Designs, Codes and Cryptography, Vol.5, No.3, pp.183-187, 1995. https://doi.org/10.1007/BF01388382
- R. Steinfeld, H. Wang, and J. Pieprzyk, "Lattice-based threshold-changeability for standard Shamir secret- sharing schemes," Advances in Cryptology-ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings 10, Springer.
- E. Dawson and D. Donovan, "The breadth of Shamir's secret-sharing scheme," Computers & Security, Vol.13, No.1, pp.69-78, 1994. https://doi.org/10.1016/0167-4048(94)90097-3
- Y. Tian, J. Ma, C. Peng, and Q. Jiang, "Fair (t, n) threshold secret sharing scheme," IET Information Security, Vol.7, No.2, pp.106-112, 2013. https://doi.org/10.1049/iet-ifs.2012.0064
- A. Bogdanov, S. Guo, and I. Komargodski, "Threshold secret sharing requires a linear size alphabet," Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II 14, Springer.
- I. Komargodski and A. Paskin-Cherniavsky, "Evolving secret sharing: dynamic thresholds and robustness," Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II 15, Springer.
- G. R. Blakley, "Safeguarding cryptographic keys," Managing Requirements Knowledge, International Workshop on, IEEE Computer Society, 1979.
- J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, "A new (k, n)-threshold secret sharing scheme and its extension," Information Security: 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings 11, Springer.
- J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, "On a fast (k, n)-threshold secret sharing scheme," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.91, No.9, pp.2365-2378, 2008.