Citation: | ZHANG Futai and ZHANG Jie, “Efficient and Information-Theoretical Secure Verifiable Secret Sharing over Bilinear Groups,” Chinese Journal of Electronics, vol. 23, no. 1, pp. 13-17, 2014, |
A. Shamir,"How to share a secret", Communications of the ACM, Vol.22, No.11, pp.612-613, 1979.
|
R. Gennaro, S. Jarecki, H. Krawczyk, et al.,"Secure distributed key generation for discrete-log based cryptosystems", Journal of Cryptology, Vol.20, No.1, pp.51-83, 2007.
|
R. Gennaro, S. Jarecki, H. Krawczyk, et al.,"Revisiting the distributed key generation for discrete-log based Cryptosystems", in RSA-CT '03, LNCS. 2612 (G Goos et al. eds), SpringerVerlag, pp.373-390, 2003.
|
R. Gennaro, S. Jarecki, H. Krawczyk, et al.,"Robust threshold DSS signatures", Information and Computation, Vol.164, No.1, pp.54-84, 2001.
|
B. Chor, S. Goldwasser, S. Micall, et al.,"Verifiable secret sharing and achieving simultaneity in the presence of faults", Proceeding of 26th FOCS (Manuel Blum et al. eds), pp.383-395, 1985.
|
P. Feldman,"A practical scheme for non-interactive verifiable secret sharing", Proceeding of the 28th IEEE Symposium on the Foundations of Computer Science (Laszlo Babai et al. eds), pp.427-437, 1987.
|
T. Pedersen,"Non-interactive and information-theoretic secure verifiable secret sharing", Cryptology-Crypto'91 (Santa Barbara), LNCS 576 (Joan Feigenbaum ed), pp.129-140, 1992.
|
J. Baek, Y. Zheng,"Identity-Based Threshold Decryption", in International Workshop on Public Key Cryptography, LNCS 2947, F. Bao et al. (Eds.), pp.262-276, 2004.
|
J. Baek, Y. Zheng,"Identity-based threshold signature scheme from the bilinear pairings", Proceedings of the International Conference on Information and Technology: Coding and Computing (Shahram Latifi et al. eds), Las Vegas, pp.124-128, 2004.
|
T.Y.Wu, Y.M. Tseng,"A paring-based publicly verifiable secret sharing scheme", Journal of Systems Science and Complexity, Vol.24, No.1, pp.186-194, 2011.
|
E. Kiltz, K. Pietrzak,"Leakage resilient ElGamal encryption. ASIACRYPT", LNCS 6477 (M Abe ed), Singapore, pp.595612, 2010.
|
D. Boneh, M. Franklin,"Identity-based encryption from the weil pairing", SIAM J. Computing, Vol.32, No.3, pp.586-615, 2003.
|
C. Gentry,"Practical identity-based encryption without random oracles", in Advances in Cryptology-EUROCRYPT 2006, LNCS 4004 (Serge Vaudenay ed.), St. Petersburg, pp.445-464, 2006.
|
D. Boneh, Xavier Boyen,"Short Signatures Without Random Oracles", Advances in Cryptology-EUROCRYPT 2004, LNCS 4004 (Christian Cachin, Jan L. Camenisch eds.), Interlaken, pp.56-73, 2004.
|
J. Xu, Z. Zhang, D. Feng,"Identity based threshold proxy signature", Chinese Journal of Electronics, Vol.15, No.1, pp.183, 2006.
|
L. Zhang, F. Zhang, X. Huang,"A secure and efficient certificateless signature scheme using bilinear pairing", Chinese Journal of Electronics, Vol.18, No.1, pp.145-148, 2009.
|
Y. Sun, H. Li,"ID-based signcryption KEM to multiple recipients", Chinese Journal of Electronics, Vol.20, No.2, pp.317-322, 2011.
|
R. Gennaro,"Theory and practice of verifiable secret sharing", Ph.D.Thesis, MIT, pp.51-107, 1996.
|