2019
DOI: 10.3934/amc.2019037
|View full text |Cite
|
Sign up to set email alerts
|

A network reliability approach to the analysis of combinatorial repairable threshold schemes

Abstract: A repairable threshold scheme (which we abbreviate to RTS ) is a (τ, n)-threshold scheme in which a subset of players can "repair" another player's share in the event that their share has been lost or corrupted. This will take place without the participation of the dealer who set up the scheme. The repairing protocol should not compromise the (unconditional) security of the threshold scheme. Combinatorial repairable threshold schemes (or combinatorial RTS ) were recently introduced by Stinson and Wei [8]. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Publications describe various examples of data securitization protocols. [1][2][3][4][5][6][7][8] The algorithms of data splitting and sharing 9 are a special example of protocols used for the processes of data securitization. 7,8,[10][11][12][13][14] In this group of protocols, apart from the classic information splitting algorithms, there are also new classes of threshold schemes, including both linguistic and biometric threshold schemes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Publications describe various examples of data securitization protocols. [1][2][3][4][5][6][7][8] The algorithms of data splitting and sharing 9 are a special example of protocols used for the processes of data securitization. 7,8,[10][11][12][13][14] In this group of protocols, apart from the classic information splitting algorithms, there are also new classes of threshold schemes, including both linguistic and biometric threshold schemes.…”
Section: Introductionmentioning
confidence: 99%
“…The processes of data securitization and their safe management are the subject of various analyses, for example, of safe management of selectively chosen data or entire information sets, specifying the need to conceal data, protocols guaranteeing data security, as well as algorithms implementing data securitization processes. Publications describe various examples of data securitization protocols . The algorithms of data splitting and sharing are a special example of protocols used for the processes of data securitization .…”
Section: Introductionmentioning
confidence: 99%