Citation: | ZHANG Xing-lan, SHAO Hua. Cryptanalysis of a Publicly Verifiable Threshold Secret Sharing Scheme[J]. Journal of Beijing University of Technology, 2010, 36(4): 562-565. |
[1] |
CHOR B, GOLDWASSER S, MICAL S, et al.Verifiable secret sharing and achieving simultaneity in the presence of faults[C]∥Proc of IEEE FOCS 85.New York:IEEE Press, 1985:383-395.
|
[2] |
PEDERSEN T P.Non-interactive and information-theoretic secure verifiable secret sharing[C]∥Proceeding of the 11thAnnual International Cryptology Conference.London:Springer-Verlag, 1991, 576:129-139.
|
[3] |
GENNARO R, RABIN M, RABIN T.Simplified VSS and fast-track multiparty computations with applications to thresholdcryptography[C]∥Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing.NewYork:ACM Press, 1998:101-111.
|
[4] |
NIKOV V, NIKOVA S.On proactive secret sharing schemes[M]∥Lecture Notes in Computer Science.Berlin:SpringerVerlag, 2004, 3357:308-325.
|
[5] |
ASAEDA H, RAHMAN M, TOYAMA Y.Structuring proactive secret sharing in mobile ad-hoc networks[C]∥InternationalSymposium on Wireless Pervasive Computer (ISWPC) .Phuket, Thailand:IEEE, 2006:1-6.
|
[6] |
高照锋, 叶延风, 庄毅.基于椭圆曲线密码体制的先应式秘密共享方案[J].计算机技术与发展, 2007, 17 (7) :131-134.GAO Zhao-feng, YE Yan-feng, ZHUANG Yi.A proactive secret sharing scheme based on the elliptic curve cryptosystem[J].Computer Technology and Development, 2007, 17 (7) :131-134. (in Chinese)
|
[7] |
HERZBERG A, JARECKI S, KRAWCZYK H.Proactive secret sharing or:how to cope with perpetual leakage[C]∥Coppersmith Advances in Cryptology CRYPTO 95.Berlin:Springer Verlag, 1995:339-352.
|
[8] |
石润华, 黄刘生.一种新的门限秘密共享方案[J].合肥工业大学学报:自然科学版, 2006, 29 (2) :163-168.SHI Run-hua, HUANG Liu-sheng.A new threshold secret sharing scheme[J].Journal of Hefei University of Technology:Natural Science, 2006, 29 (2) :163-168. (in Chinese)
|
[9] |
石润华, 仲红, 黄刘生.公开可验证的门限秘密共享方案[J].微电子学与计算机, 2008, 25 (1) :29-33.SHI Run-hua, ZHONG Hong, HUANG Liu-sheng.A public verifiable threshold secret sharing scheme[J].Microelectronics&Computer, 2008, 25 (1) :29-33. (in Chinese)
|
[1] | BI Jing-guo, HAN Li-dong, LIU Ming-jie. Cryptanalysis of a Public-key Scheme Based on the Chinese Remainder Theorem[J]. Journal of Beijing University of Technology, 2012, 38(5): 768-772. |
[2] | ZHOU You-sheng, XIN Yang, QING Si-han, YANG Yi-xian. Forward-backward Secure Group Signature Scheme[J]. Journal of Beijing University of Technology, 2012, 38(5): 736-739. |
[3] | CAI Yong-quan, CHENG Fu-lai. Threshold Signature Scheme Based on Factorial Decompose Theorem of Polynomial[J]. Journal of Beijing University of Technology, 2012, 38(5): 727-729. |
[4] | CAI Yong-quan, ZHANG En, HE Jing-yang. (t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J]. Journal of Beijing University of Technology, 2011, 37(8): 1231-1235. |
[5] | LI Xue-lian, HU Yu-pu, GAO Jun-tao, FANG Yi-qi. The Nonlinearity Lower Bounds on the Second Order of Cubic Monomial Boolean Functions[J]. Journal of Beijing University of Technology, 2010, 36(5): 635-639. |
[6] | WANG Hou-zhen, ZHANG Huan-guo, GUAN Hai-ming, WU Qian-hong. Multivariable Algebra Theory and Its Application in Cryptography[J]. Journal of Beijing University of Technology, 2010, 36(5): 627-634. |
[7] | WANG Jian, JIANG Nan, LI Hui, NIU Xin-xin, YANG Yi-xian. Effective Access Authentication Protocol for Mobile Environments Based on SMS[J]. Journal of Beijing University of Technology, 2010, 36(2): 268-273. |
[8] | YI Xiao-lin, ZHOU Wei, ZHAO Lei, JIN Yan-yan. A Proxy Signature Scheme Based on Hyperelliptic Curve[J]. Journal of Beijing University of Technology, 2009, 35(8): 1126-1131. |
[9] | LI Xin-she, DU Xiao-hui, YIN Yi-feng, HU Yu-pu. Improvement of the Polymorphic Cipher and Its Analysis of the Strict Avalanche Criterion[J]. Journal of Beijing University of Technology, 2009, 35(6): 851-855. |
[10] | Zheng Hao. Lexicographic Order and Its Application in Testing the Randomness of DES S-boxes[J]. Journal of Beijing University of Technology, 1993, 19(1): 34-41. |