Shared generation of pseudo-random functions (Q1827581): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / Wikidata QID
 
Property / Wikidata QID: Q62559248 / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.jco.2003.08.021 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1964363905 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3202940 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Ramp Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2721175 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a function securely / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374937 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536289 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4542590 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust Threshold DSS Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust and efficient sharing of RSA functions. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3729902 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiple assignment scheme for sharing secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341671 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Geometric secret sharing schemes and their duals / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5284641 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934704 / rank
 
Normal rank
Property / cites work
 
Property / cites work: One way functions and pseudorandom generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1--5, 2002. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distributing the encryption and decryption of a block cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343434 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250771 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4520765 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249323 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4853712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An explication of secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418543 / rank
 
Normal rank

Latest revision as of 18:24, 6 June 2024

scientific article
Language Label Description Also known as
English
Shared generation of pseudo-random functions
scientific article

    Statements

    Shared generation of pseudo-random functions (English)
    0 references
    0 references
    0 references
    6 August 2004
    0 references
    This is a continuation of the idea of \textit{S. Micali} and \textit{R. Sidney} [Lect. Notes Comput. Sci. 963, 185--196 (1995; Zbl 0868.94030)] for shared generation of a pseudo-random function \(f\) among \(n\) players such that \(u\) of the players can compute \(f(x)\) while \(t\) or fewer of them do not do it, for each input \(x\). To study this problem, the notion of a ramp access structure is introduced and discussed. The main results are obtained for a special case of these objects, so-called \((t,u,n)\) ramp access structures with \((t,u,n)\) cumulative maps, which for \(t=u-1\) form the \((u,n)\) threshold access structures with \((u,n)\) cumulative maps studied by Micali and Sidney. For the minimal \((t,u,n)\) cumulative maps lower and upper bounds are derived. The paper has been crowned with an algorithm that designs a \((t,u,n)\) cumulative map as the solution of a special case of the set-cover problem. This construction achieves the optimum bound by a factor of at most \(u\ln2\).
    0 references
    cryptography
    0 references
    pseudo-random functions
    0 references
    secret sharing
    0 references
    access structure
    0 references
    cumulative maps
    0 references
    resilient collection of sets
    0 references
    set-cover problem
    0 references

    Identifiers