Results 1  10
of
262,399
Secret Sharing
"... Abstract: This document provides the basic concept of Secret Sharing technique in practice. Main overview of some current secret sharing schemes are discussed according to the papers, provided during the course. Future scope and possibilities of secret sharing schemes are also introduced. 1 ..."
Abstract
 Add to MetaCart
Abstract: This document provides the basic concept of Secret Sharing technique in practice. Main overview of some current secret sharing schemes are discussed according to the papers, provided during the course. Future scope and possibilities of secret sharing schemes are also introduced. 1
Publicly Verifiable Secret Sharing
, 1996
"... . A secret sharing scheme allows to share a secret among several participants such that only certain groups of them can recover it. Verifiable secret sharing has been proposed to achieve security against cheating participants. Its first realization had the special property that everybody, not only t ..."
Abstract

Cited by 136 (1 self)
 Add to MetaCart
. A secret sharing scheme allows to share a secret among several participants such that only certain groups of them can recover it. Verifiable secret sharing has been proposed to achieve security against cheating participants. Its first realization had the special property that everybody, not only
Generalized secret sharing and monotone functions
 in Proceedings on Advances in cryptology. SpringerVerlag
, 1990
"... Secret Sharing from the perspective of threshold schemes has been wellstudied over the past decade. Threshold schemes, however, can only handle a small fraction of the secret sharing functions which we may wish to form. For example, if it is desirable to divide a secret among four participants A, ..."
Abstract

Cited by 182 (0 self)
 Add to MetaCart
Secret Sharing from the perspective of threshold schemes has been wellstudied over the past decade. Threshold schemes, however, can only handle a small fraction of the secret sharing functions which we may wish to form. For example, if it is desirable to divide a secret among four participants A
Secret Sharing
"... Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1, s2,..., sn, where each si does not reveal anything about S. • The shares can be distributed among a group of participants or kept by a single person (depending on the purpose of the computation). • W ..."
Abstract
 Add to MetaCart
Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1, s2,..., sn, where each si does not reveal anything about S. • The shares can be distributed among a group of participants or kept by a single person (depending on the purpose of the computation
Anonymous Secret Sharing Schemes
 Designs, Codes and Cryptography
, 1996
"... In this paper we study anonymous secret sharing schemes. Informally, in an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In such schemes the computation of the secret can be carried out by giving the shares to a black box t ..."
Abstract

Cited by 86 (7 self)
 Add to MetaCart
In this paper we study anonymous secret sharing schemes. Informally, in an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In such schemes the computation of the secret can be carried out by giving the shares to a black box
On secret sharing systems
 IEEE Transactions on Information Theory
, 1983
"... time for all neighbors m of j and hence Zj will become (S + 1). Since j has no nodes at hopdistance (S + l), (7) will hold and this completes the proof of the lemma. Lemma MH1 a) and Lemma MH2 a), b) are exactly Theorem MH1 and this completes the proof of the theorem. REFERENCES [ 1] R. G. Gall ..."
Abstract

Cited by 145 (0 self)
 Add to MetaCart
time for all neighbors m of j and hence Zj will become (S + 1). Since j has no nodes at hopdistance (S + l), (7) will hold and this completes the proof of the lemma. Lemma MH1 a) and Lemma MH2 a), b) are exactly Theorem MH1 and this completes the proof of the theorem. REFERENCES [ 1] R. G. Gallager, “A shortest path routing algorithm with automatic resynch, ” unpublished note, March 1976. [2] A. Segall, P. M. Merlin, and R. G. Gallager, “A recoverable protocol for loopfree distributed routing, ” Proc. ICC, June 1978. [3] S. G. Finn, “Resynch procedures and a failsafe network protocol
On the Size of Shares for Secret Sharing Schemes
 Journal of Cryptology
"... A secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret, but any nonqualified subset has absolutely no information on the secret. The set of all qualified subsets defines the access structure to the se ..."
Abstract

Cited by 79 (8 self)
 Add to MetaCart
A secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret, but any nonqualified subset has absolutely no information on the secret. The set of all qualified subsets defines the access structure
Compounding Secret Sharing Schemes
, 2003
"... this paper we introduce the class of composite access structures for secret sharing. We also provide secret sharing schemes realizing these structures and study their information rates. As a particular case of this construction, we present the subclass of iterated threshold schemes, a large class of ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
this paper we introduce the class of composite access structures for secret sharing. We also provide secret sharing schemes realizing these structures and study their information rates. As a particular case of this construction, we present the subclass of iterated threshold schemes, a large class
Secret sharing made short
, 1988
"... Abstract. A wellknown fact in the theory of secret sharing schemes is that shares must be of length at least as the secret itself. However, the proof of this lower bound uses the notion of information theoretic secrecy. A natural (and very practical) question is whether one can do better for secret ..."
Abstract

Cited by 62 (0 self)
 Add to MetaCart
Abstract. A wellknown fact in the theory of secret sharing schemes is that shares must be of length at least as the secret itself. However, the proof of this lower bound uses the notion of information theoretic secrecy. A natural (and very practical) question is whether one can do better
Secret Sharing and Secure . . .
, 2007
"... This thesis explores the different secret sharing schemes from the 1970s until today. We present the schemes and provide descriptions and examples on how they work. More time is devoted to exploring monotone span programs, a generalisation of secret sharing schemes, as these are the building blocks ..."
Abstract
 Add to MetaCart
This thesis explores the different secret sharing schemes from the 1970s until today. We present the schemes and provide descriptions and examples on how they work. More time is devoted to exploring monotone span programs, a generalisation of secret sharing schemes, as these are the building blocks
Results 1  10
of
262,399