1979
DOI: 10.1145/359168.359176
|View full text |Cite
|
Sign up to set email alerts
|

How to share a secret

Abstract: In this paper we show how to divide data D into n pieces in such a way that D is easily reconstructable from any k pieces, but even complete knowledge of k - 1 pieces reveals absolutely no information about D . This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
6,113
0
63

Year Published

1998
1998
2009
2009

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 10,838 publications
(6,477 citation statements)
references
References 1 publication
4
6,113
0
63
Order By: Relevance
“…The first constructions of secret sharing schemes were due to Blakley [2] and Shamir [4]. Their schemes are called threshold schemes because they have the property that for some t , only the subsets of participants of cardinality at least t can determine the secret.…”
Section: This Work Performedmentioning
confidence: 99%
“…The first constructions of secret sharing schemes were due to Blakley [2] and Shamir [4]. Their schemes are called threshold schemes because they have the property that for some t , only the subsets of participants of cardinality at least t can determine the secret.…”
Section: This Work Performedmentioning
confidence: 99%
“…3. Alice employs a secret sharing scheme [8,9] to encode s into n shares, such that all n shares are required to reconstruct s. 4. Alice sends Bob one share via each cycle-free path.…”
Section: (A B) ∈ E(g))mentioning
confidence: 99%
“…It should be noted that δ nc represents only a portion of the total probability that the protocol will fail, δ; by necessity, δ δ nc . In the following section, we use equation (8) to estimate the minimum degree cut-off k min that should be imposed to constrain the probability of such failures to less than some allowed maximum δ nc .…”
Section: Network Topologiesmentioning
confidence: 99%
“…), the Registration Server generates the EID i (encrypted value of the EPC i ) of the Tag i . In this paper, for encryption of the EID i , cryptographic secret sharing methods are adopted [3,4,9,13,18,26,27]. Fig.…”
Section: Proposed Mclt Systemmentioning
confidence: 99%
“…Therefore, only authorized administrators can identify the MID i of the tag i . If X = {Adm 1 , Adm 2 , · · · , Adm t } is a qualified subset to recover the MID i , the recovery phase is operated as follows; ① Through the cooperation of every Adm i ∈ X, the value r 1 + r 2 + · · · + r t modp is recovered using polynomial interpolation [26]. ② Each Adm i ∈ X computes (g ti ) r1 + r2 + ··· + rt using a stored g ti .…”
Section: Fig 8 Missing Child Location Trackingmentioning
confidence: 99%