1990
DOI: 10.1007/0-387-34799-2_30
|View full text |Cite
|
Sign up to set email alerts
|

How to (Really) Share a Secret

Abstract: JntroductionIn information based systems, the integrity of the information (from unauthorized scrutiny or disclosure, manipulation or alteration, forgery, false dating, etc.) is commonly provided for by requiring operation(s) on the information that one or more of the participants, who know some private piece(s) of information not known to all of the other participants, can carry out but which (probably) can't be carried out by anyone who doesn't know the private information. Encryption/decryption in a single … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
155
0
2

Year Published

1990
1990
2016
2016

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 205 publications
(157 citation statements)
references
References 13 publications
0
155
0
2
Order By: Relevance
“…We will show in this section that the Boolean circuits representing multilevel access structures [12,14] fulfill this property. For a compact representation of multilevel access structures we need Boolean circuits with threshold gates (as in [7]).…”
Section: Extensions and Applicationsmentioning
confidence: 87%
“…We will show in this section that the Boolean circuits representing multilevel access structures [12,14] fulfill this property. For a compact representation of multilevel access structures we need Boolean circuits with threshold gates (as in [7]).…”
Section: Extensions and Applicationsmentioning
confidence: 87%
“…Simmons [5] has described an access structure that arises in a practical application of secret sharing. A multileueI access structure is one in which each participant is assigned a level which is a positive integer and the access structure consists of those subsets which contain at least r participants all of level at most T .…”
Section: This Work Performedmentioning
confidence: 99%
“…For example, if the secret is a random element of GF(q), and all shares are elements of GF(q), then the information rate is 1. Simmons [5] defined a related notion. He called a secret sharing scheme eztrinsic if the set T of possible shares is the same for all participants.…”
Section: Introductionmentioning
confidence: 99%
“…The access structure in secret a sharing scheme (e.g., Simmons, 1990;Stinson, 1992) can also be modeled by a simple game, but in this theory a different approach to defining seniority is often used. To this end Simmons (1990) introduced the concept of a hierarchical access structure.…”
Section: Introductionmentioning
confidence: 99%
“…To this end Simmons (1990) introduced the concept of a hierarchical access structure. Such an access structure stipulates that agents are partitioned into m levels, and a sequence of thresholds k 1 < k 2 < .…”
Section: Introductionmentioning
confidence: 99%