期刊文献+

Algebraic manipulation detection codes 被引量:1

Algebraic manipulation detection codes
原文传递
导出
摘要 Algebraic manipulation detection codes are a cryptographic primitive that was introduced by Cramer et al. (Eurocrypt 2008). It encompasses several methods that were previously used in cheater detection in secret sharing. Since its introduction, a number of additional applications have been found. This paper contains a detailed exposition of the known results about algebraic manipulation detection codes as well as some new results. Algebraic manipulation detection codes are a cryptographic primitive that was introduced by Cramer et al. (Eurocrypt 2008). It encompasses several methods that were previously used in cheater detection in secret sharing. Since its introduction, a number of additional applications have been found. This paper contains a detailed exposition of the known results about algebraic manipulation detection codes as well as some new results.
出处 《Science China Mathematics》 SCIE 2013年第7期1349-1358,共10页 中国科学:数学(英文版)
基金 supported by the Singapore National Research Foundation(Grant No.NRF-CRP2-2007-03)
关键词 CRYPTOGRAPHY keyless message authentication algebraic manipulation 代数运算 检测 代码 操作 秘密共享 应用程序 原语 加密
  • 相关文献

参考文献24

  • 1Beimel A. Secret-sharing schemes: A survey on coding and cryptology. In: Third International Workshop, IWCC 2011, Lecture Notes in Computer Science, vol. 6639. Berlin: Springer, 2011, 11-46.
  • 2Brassard G, Broadbent A, Fitzsimons J, et al. Anonymous quantum communication. In: Advances in Cryptology, Asiacrypt 2007, Lecture Notes in Computer Science, vol. 4833. Berlin: Springer, 2007, 460-473.
  • 3Broadbent A, Tapp A. Information-theoretic security without an honest majority. In: Advances in Cryptology, Asi- acrypt 2007, Lecture Notes in Computer Science, vol. 4833. Berlin: Springer, 2007, 410-426.
  • 4Cabello S, Padrd C, Sez G. Secret sharing schemes with detection of cheaters for a general access structure. Des Codes Cryptogr, 2002, 25:175-188.
  • 5Cramer R, Dodis , Fehr S, et al. Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. In: Advances in Cryptology, Eurocrypt 2008, Lecture Notes in Computer Science, vol. 4965. Berlin: Springer, 2008, 471-488.
  • 6Dodis Y, Kanukurthi B, Katz J, et al. Robust fuzzy extractors and authenticated key agreement from close secrets. IEEE Trans Inform Theory, 2012, 58:6207-6222.
  • 7Dodis Y, Katz J, Reyzin L, et al. Robust fuzzy extractors and authenticated key agreement from close secrets. In: Advances in Cryptology, Crypto 2006, Lecture Notes in Computer Science, vol. 4117. Berlin: Springer, 2006, 232-250.
  • 8Dodis Y, Ostrovsky R, Reyzin L, et al. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J Comput, 2008 38:97-139.
  • 9Dziembowski S, Pietrzak K, Wichs D. Non-malleable codes. In: Innovations in Computer Science, ICS 2010. Beijing: Tsinghua University Press, 2010, 434-452.
  • 10Gordon S D, Ishai Y, Moran T, et al. On complete primitives for fairness. In: Theory of Cryptography, TCC 2010, Lecture Notes in Computer Science, vol. 5978. Berlin: Springer, 2010, 91-108.

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部