Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication
Citations
16 citations
Cites background from "Universal Construction of Cheater-I..."
...However, unlike the identifiable secret sharing solutions [72, 178, 227, 201, 228, 154, 142, 69], our scheme supports share verification and does not require any digital signature or message authentication subroutines....
[...]
6 citations
5 citations
4 citations
3 citations
Cites background or methods from "Universal Construction of Cheater-I..."
...strongly universal) hash functions instead of universal hash functions in [30]....
[...]
...We construct a non-interactive SMT protocol based on the CISS of Hayashi and Koshiba [30]....
[...]
References
14,340 citations
"Universal Construction of Cheater-I..." refers background in this paper
...Secret sharing is a basic primitive for secure information transmission [21]....
[...]
2,886 citations
1,586 citations
"Universal Construction of Cheater-I..." refers background in this paper
...Pr h i←H [hi(a)=b]= 1 |B| holds, where the probability is over the uniformly random choice of hi from H. The original definition of universal-2 hash functions and several constructions can be found in [25]. C. Toeplitz Matrices An (n ×m)-Toeplitz matrix T = (Ti,j) over Fq can be determined by s =s 1s 2···sn+m−1 ∈Fn+m−1 q \{0n+m−1} as follows: Set Tn,1 =s 1,...,T 1,1 =sn (for the first column) and T 1,2 ...
[...]
1,419 citations
"Universal Construction of Cheater-I..." refers background in this paper
..., hard-core functions [8] and universal hash functions [14], [15])....
[...]
1,061 citations