Share Renewal Scheme in Proactive Secret Sharing for Threshold Cryptosystem
![]() |
이윤호
(한국과학기술원 전자전산학과)
김희열 (한국과학기술원 전자전산학과) 정병천 (한국과학기술원 전자전산학과) 이재원 (한국과학기술원 전자전산학과) 윤현수 (한국과학기술원 전자전산학과) |
1 | S. Jarecki, 'Efficient Threshold Cryptography', Ph.D Thesis in MIT, 2001 |
2 | A. Shamir, 'How to Share a Secret', vol.22, pp. 612-613, Communications of The ACM, 1979 DOI ScienceOn |
3 | B. Chor, S. Goldwasser, S. Micalli and B. Awerbuch, 'Verifiable secret sharing and achieving simultaneous broadcast', pp.335-344, Proc. of IEEE Fund, of Comp. Sci., 1985 |
4 | T.Pederson, 'Non-interactive and information-theoretic secure verifiable secret sharing', pp.129-140, CRYPTO'91-LNCS, 1991 |
5 | T.Pederson, 'A threshold cryptosy stem without a trusted third party', pp.522-526, EuroCrypt'91 -LNCS 1991 |
6 | R.Canetti, 'Adaptive Security for Threshold Cry-ptosystems', pp.98-116, CRYPTO'99 - LNCS, 1999 |
7 | R.Gennero, 'Secure Distributed Key Generation for Discrete-Log Based Cryptosystems', pp.295-310, Eurocrypt'99 - LNCS, 1999 |
8 | S.Jarecki and A.Lysyanskaya, 'Adaptively secure threshold cryptography:Introducing concurrency, removing erasures', Eurocrypt'2000 - LNCS, 2000 |
9 | R.Ostrovsky and M.Yung, 'How to withstand mobile virus attacks', pp.51-61, In Proc. 10th ACM Symp. on Principles of Distributed Computation, 1991 DOI |
10 | P. Feldman, 'A Practical Scheme for Non-interactive Verifiable Secret Sharing', pp.427-437, Proc. 28th IEEE Symp. on Foundations of Computer Science, Los Angeles, 1987 |
11 | H.K.A.Herzberg, S.Jarecki and M.Yung, 'Proactive Secret Sharing Or: How to Cope With Perpetual Leakage', CRYPTO'95 - LNCS, 1995 |
12 | S.Goldwasser, S.Micali and C.Rackoff, 'The knowledge complexity of interactive proof-system', pp.365-377, STOC. 85, 1985 |
![]() |