• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 3,488
Next 10 →

Secret Sharing and Secure . . .

by Michael Mortensen , 2007
"... This thesis explores the different secret sharing schemes from the 1970s until today. We present the schemes and provide descriptions and examples on how they work. More time is devoted to exploring monotone span programs, a generalisation of secret sharing schemes, as these are the building blocks ..."
Abstract - Add to MetaCart
This thesis explores the different secret sharing schemes from the 1970s until today. We present the schemes and provide descriptions and examples on how they work. More time is devoted to exploring monotone span programs, a generalisation of secret sharing schemes, as these are the building blocks

Mobile Proactive Secret Sharing

by David Andrew Schultz , 2007
"... This thesis describes mobile proactive secret sharing (MPSS), an extension of proactive secret sharing. Mobile proactive secret sharing is much more flexible than proactive secret sharing in terms of group membership: instead of the group of shareholders being exactly the same from one epoch to the ..."
Abstract - Cited by 9 (2 self) - Add to MetaCart
This thesis describes mobile proactive secret sharing (MPSS), an extension of proactive secret sharing. Mobile proactive secret sharing is much more flexible than proactive secret sharing in terms of group membership: instead of the group of shareholders being exactly the same from one epoch

On-line Secret Sharing

by Christian Cachin - In Proc. of the 5th IMA Conf. on Cryptography and Coding , 1995
"... . We propose a new construction for computationally secure secret sharing schemes with general access structures where all shares are as short as the secret. Our scheme provides the capability to share multiple secrets and to dynamically add participants on-line, without having to re-distribute new ..."
Abstract - Cited by 19 (0 self) - Add to MetaCart
. We propose a new construction for computationally secure secret sharing schemes with general access structures where all shares are as short as the secret. Our scheme provides the capability to share multiple secrets and to dynamically add participants on-line, without having to re-distribute new

Minimal Codewords and Secret Sharing

by James L. Massey - Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory , 1993
"... : The use of a linear code to "split" secrets into equal-size shares is considered. The determination of which sets of shares can be used to obtain the secret leads to the apparently new notion of minimal codewords in a linear code. It is shown that the minimal codewords in the dual code c ..."
Abstract - Cited by 51 (1 self) - Add to MetaCart
: The use of a linear code to "split" secrets into equal-size shares is considered. The determination of which sets of shares can be used to obtain the secret leads to the apparently new notion of minimal codewords in a linear code. It is shown that the minimal codewords in the dual code

On secret sharing for graphs

by Kamil Kulesza, Zbigniew Kotulski
"... In the paper we discuss how to share the secrets, that are graphs. So, far secret sharing schemes were designed to work with numbers. As the first step, we propose conditions for “graph to number ” conversion methods. Hence, the existing schemes can be used, without weakening their properties. Next, ..."
Abstract - Add to MetaCart
In the paper we discuss how to share the secrets, that are graphs. So, far secret sharing schemes were designed to work with numbers. As the first step, we propose conditions for “graph to number ” conversion methods. Hence, the existing schemes can be used, without weakening their properties. Next

Visual Secret Sharing

by Brian Blackmore , 2000
"... Secret sharing schemes are briey discussed to introduce the topic of secrect sharing. Visual secret sharing is examined, including Naor and Shamir's basic two-color visual secret sharing schemes. Several extensions to the basic model are observed, including proposals by Naor and Shamir for gray ..."
Abstract - Add to MetaCart
Secret sharing schemes are briey discussed to introduce the topic of secrect sharing. Visual secret sharing is examined, including Naor and Shamir's basic two-color visual secret sharing schemes. Several extensions to the basic model are observed, including proposals by Naor and Shamir

Cheating Immune Secret Sharing

by Xian-mo Zhang, Josef Pieprzyk , 2001
"... We consider secret sharing with binary shares. This model allows us to use the well developed theory of cryptographically strong boolean functions. We prove that for given secret sharing, the average cheating probability over all cheating and original vectors, i.e., = 1 n 2 n P n c=1 P 2Vn ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
We consider secret sharing with binary shares. This model allows us to use the well developed theory of cryptographically strong boolean functions. We prove that for given secret sharing, the average cheating probability over all cheating and original vectors, i.e., = 1 n 2 n P n c=1 P 2Vn

ARCHIVES Rational Secret Sharing

by Alissa Natanovna Reyzin, C Ertified, Silvio Micali, Alissa Natanovna Reyzin , 2008
"... Recent work has attempted to bridge the fields of Cryptography and Game Theory in order to create more robust protocols that allow for a variety of player types. A keystone functionality used in cryptography is Secret Sharing. While there are several well known, efficient protocols that implement Se ..."
Abstract - Add to MetaCart
Recent work has attempted to bridge the fields of Cryptography and Game Theory in order to create more robust protocols that allow for a variety of player types. A keystone functionality used in cryptography is Secret Sharing. While there are several well known, efficient protocols that implement

Hierarchical threshold secret sharing

by Tamir Tassa - J. Cryptol , 2007
"... We consider the problem of threshold secret sharing in groups with hierarchical structure. In such settings, the secret is shared among a group of participants that is partitioned into levels. The access structure is then determined by a sequence of threshold requirements: a subset of participants i ..."
Abstract - Cited by 34 (3 self) - Add to MetaCart
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such settings, the secret is shared among a group of participants that is partitioned into levels. The access structure is then determined by a sequence of threshold requirements: a subset of participants

Quantum secret sharing,

by Mark Hillery , Vladimír Bužek , André Berthiaume - Physical Review A, , 1999
"... Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. We show how this procedure can be implemented using GreenbergerHorne-Zeilinger ͑GHZ͒ states. In the quantum case the presence of an eavesdrop ..."
Abstract - Cited by 35 (0 self) - Add to MetaCart
Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. We show how this procedure can be implemented using GreenbergerHorne-Zeilinger ͑GHZ͒ states. In the quantum case the presence
Next 10 →
Results 11 - 20 of 3,488
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University