1995
DOI: 10.1007/3-540-49264-x_16
|View full text |Cite
|
Sign up to set email alerts
|

General Short Computational Secret Sharing Schemes

Abstract: Abstract. A secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret. If any non qualified subset has absolutely no information about the secret, then the scheme is called perfect. Unfortunately, in this case the size of the shares cannot be less than the size of the secret. Krawczyk [9] showed how to improve this bound in the case of computational threshold schemes by using Rabin's information dispersal algorithms … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2002
2002
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 13 publications
(4 reference statements)
0
20
0
Order By: Relevance
“…Robustness is then added-on using a hash-function-based technique that Krawczyk introduced in a separate paper [32]. Follow-on work to Krawczyk's paper has mostly focused on doing CSS for more general access structures [1,14,34,51].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Robustness is then added-on using a hash-function-based technique that Krawczyk introduced in a separate paper [32]. Follow-on work to Krawczyk's paper has mostly focused on doing CSS for more general access structures [1,14,34,51].…”
Section: Introductionmentioning
confidence: 99%
“…Commercial product offerings and an open-source development community have also taken root. 1 An issue of Computer magazine explained these ideas [54]. Yet all of this has happened in the absence of even a formal definition for RCSS.…”
Section: Introductionmentioning
confidence: 99%
“…However, the best known perfect t-out-of-n schemes for sharing a 1-bit secret (when 2 ≤ t ≤ n − 1) use log n-bit shares (e.g., in Shamir's scheme). 2 Kilian and Nisan [32] proved that this is unavoidable when t ≤ αn for some constant α < 1; they prove that the shares are at least log(n − t + 2)-bit strings.…”
Section: Our Resultsmentioning
confidence: 99%
“…In these schemes the privacy and possibly also the correctness are only statistical. Another related notion is computational secret-sharing schemes, considered in [49,34,2,48]. In these schemes, unauthorized sets of parties cannot distinguish in polynomial time between the different secrets.…”
Section: Our Resultsmentioning
confidence: 99%
See 1 more Smart Citation