1999
DOI: 10.1016/s0140-3664(99)00041-9
|View full text |Cite
|
Sign up to set email alerts
|

General secret sharing scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2004
2004
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…A general access secret sharing scheme allows mapping every possible subgroup of shareholders into the access structure. Multiple schemes, like those presented in [5,6,8,10,25] improve the efficiency by reducing the number of shares or the size of each share.…”
Section: General Access Secret Sharing Schemesmentioning
confidence: 99%
“…A general access secret sharing scheme allows mapping every possible subgroup of shareholders into the access structure. Multiple schemes, like those presented in [5,6,8,10,25] improve the efficiency by reducing the number of shares or the size of each share.…”
Section: General Access Secret Sharing Schemesmentioning
confidence: 99%
“…A PSS scheme divides the lifetime of a service into a series of time periods: T (0) , T (1) , T (2) , … , where T is the interval between any two consecutive executions of the share update protocol. Since all servers hold new shares after the execution of share update protocol, the adversary is forced to re-initiate his attack.…”
Section: B Evaluation Model Of Pss Cryptosystemmentioning
confidence: 99%
“…Shamir [1] addressed this problem in 1979 respectively when he introduced the concept of threshold scheme. From then on, many research literatures have been published [2][3][4] in terms of the different kinds of scenario. Instead of storing the secret at one server, a (k, n) secret sharing scheme divides the secret into n shares in such a way that the secret can be reconstructed only from k or more shares, k is called threshold of the scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Shamir's approach is based upon the polynomial interpolation in a two-dimensional space, while Blakley's scheme originates from the intersections of some high-dimensional planes in a high-dimensional space. Shamir's scheme is simple and easy to implement so that it has attracted many researchers' attention [3,4,9,11,16]. Consider an r−1 degree polynomial:…”
Section: Introductionmentioning
confidence: 99%