Algorithmica
Distributing the power of a government to enhance the privacy of voters
PODC '86 Proceedings of the fifth annual ACM symposium on Principles of distributed computing
Generalized linear threshold scheme
Proceedings of CRYPTO 84 on Advances in cryptology
The knowledge complexity of interactive proof-systems
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
Communications of the ACM
Encrypting Problem Instances: Or ..., Can You Take Advantage of Someone Without Having to Trust Him?
CRYPTO '85 Advances in Cryptology
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
A subexponential algorithm for the discrete logarithm problem with applications to cryptography
SFCS '79 Proceedings of the 20th Annual Symposium on Foundations of Computer Science
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
A robust and verifiable cryptographically secure election scheme
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
Verifiable secret sharing and achieving simultaneity in the presence of faults
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
A zero-one law for Boolean privacy
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Generalized secret sharing and monotone functions
CRYPTO '88 Proceedings on Advances in cryptology
How to (really) share a secret
CRYPTO '88 Proceedings on Advances in cryptology
The detection of cheaters in threshold schemes
CRYPTO '88 Proceedings on Advances in cryptology
Secret sharing over infinite domains (extended abstract)
CRYPTO '89 Proceedings on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
Efficient anonymous channel and all/nothing election scheme
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
How to share a function securely
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Receipt-free secret-ballot elections (extended abstract)
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
A verifiable secret shuffle and its application to e-voting
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Efficient generation of shared RSA keys
Journal of the ACM (JACM)
Detecting Dealer Cheating in Secret Sharing Systems
COMPSAC '00 24th International Computer Software and Applications Conference
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
How to Solve any Protocol Problem - An Efficiency Improvement
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract)
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Secret Sharing with Public Reconstruction (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Non-perfect Secret Sharing over General Access Structures
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Scalable threshold scheme without a trusted third party
ICCC '02 Proceedings of the 15th international conference on Computer communication
Payment technologies for E-commerce
Privacy preserving regression modelling via distributed computation
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
(Im)Possibility of Unconditionally Privacy-Preserving Auctions
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2
Decentralized voting with unconditional privacy
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Unconditional privacy in social choice
TARK '05 Proceedings of the 10th conference on Theoretical aspects of rationality and knowledge
Secure distributed data-mining and its application to large-scale network measurements
ACM SIGCOMM Computer Communication Review
A secure distributed framework for achieving k-anonymity
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving performance measurements
Proceedings of the 2006 SIGCOMM workshop on Mining network data
Software obfuscation from crackers' viewpoint
ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting
Electronic Notes in Theoretical Computer Science (ENTCS)
Secure computation with horizontally partitioned data using adaptive regression splines
Computational Statistics & Data Analysis
On the Existence of Unconditionally Privacy-Preserving Auction Protocols
ACM Transactions on Information and System Security (TISSEC)
Privacy-preserving link discovery
Proceedings of the 2008 ACM symposium on Applied computing
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
Secure Construction of Contingency Tables from Distributed Data
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Analysis, improvement and simplification of Prêt à voter with Paillier encryption
EVT'08 Proceedings of the conference on Electronic voting technology
Privacy-preserving linear programming
Proceedings of the 2009 ACM symposium on Applied Computing
Batch verification of validity of bids in homomorphic e-auction
Computer Communications
Decentralized Polling with Respectable Participants
OPODIS '09 Proceedings of the 13th International Conference on Principles of Distributed Systems
Homomorphisms of secret sharing schemes: a tool for verifiable signature sharing
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Efficient multiplicative sharing schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Classification of ideal homomorphic threshold schemes over finite Abelian groups
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Redistribution of mechanical secret shares
FC'02 Proceedings of the 6th international conference on Financial cryptography
Multiple target localisation in sensor networks with location privacy
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Strong (n,t,n) verifiable secret sharing scheme
Information Sciences: an International Journal
Secure encrypted-data aggregation for wireless sensor networks
Wireless Networks
WD'09 Proceedings of the 2nd IFIP conference on Wireless days
Crypto topics and applications II
Algorithms and theory of computation handbook
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations
Proceedings of the first ACM conference on Data and application security and privacy
Comments on Harn---Lin's cheating detection scheme
Designs, Codes and Cryptography
Benaloh's dense probabilistic encryption revisited
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Verifiable secret sharing with comprehensive and efficient public verification
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Information-flow types for homomorphic encryptions
Proceedings of the 18th ACM conference on Computer and communications security
Privacy preserving indexing for eHealth information networks
Proceedings of the 20th ACM international conference on Information and knowledge management
Decentralized polling with respectable participants
Journal of Parallel and Distributed Computing
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Intelligent anonymous secure e-voting scheme
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Multi-party computation with conversion of secret sharing
Designs, Codes and Cryptography
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Efficient (n, t, n) secret sharing schemes
Journal of Systems and Software
Protecting privacy during peer-to-peer exchange of medical documents
Information Systems Frontiers
Secure cloud-based medical data visualization
Proceedings of the 20th ACM international conference on Multimedia
Secure Bayesian model averaging for horizontally partitioned data
Statistics and Computing
Information and Computation
Hi-index | 0.00 |
In 1979, Blackley and Shamir independently proposed schemes by which a secret can be divided into many shares which can be distributed to mutually suspicious agents. This paper describes a homomorphism property attained by these and several other secret sharing schemes which allows multiple secrets to be combined by direct computation on shares. This property reduces the need for trust among agents and allows secret sharing to be applied to many new problems. One application described here gives a method of verifiable secret sharing which is much simpler and more efficient than previous schemes. A second application is described which gives a fault-tolerant method of holding verifiable secret-ballot elections.