Lecture Notes in Computer Science
DOI: 10.1007/3-540-46885-4_44
|View full text |Cite
|
Sign up to set email alerts
|

Prepositioned Shared Secret and/or Shared Control Schemes

Abstract: Secret sharing is simply a special form of key distribution.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(16 citation statements)
references
References 14 publications
0
16
0
Order By: Relevance
“…These participants are then effectively "sleeping participants" until the time of enrollment, when the dealer broadcasts their share to them, encrypted under the key that they were issued at setup. This is essentially the same technique used in [18] to remotely activate threshold schemes.…”
Section: A Enrollmentmentioning
confidence: 99%
“…These participants are then effectively "sleeping participants" until the time of enrollment, when the dealer broadcasts their share to them, encrypted under the key that they were issued at setup. This is essentially the same technique used in [18] to remotely activate threshold schemes.…”
Section: A Enrollmentmentioning
confidence: 99%
“…All you have to do is to envision a system of equations that corresponds to the particular scheme. Some excellent papers on generalized secret-sharing schemes are [1462,1463,1464].…”
Section: Advanced Threshold Schemesmentioning
confidence: 99%
“…among n participants in such a way that any I; of them can recover tlie secret, but any k -1, or fewer, have absolutely no information on the secret (see [26] for a compreherisive bibliography on (k, 71) tlireshold schemes).…”
Section: Introductionmentioning
confidence: 99%
“…The idea of protecting against cheating by one or more participants is addressed in [IS], (261, [19], [23] and [O]. €'repositioned schemes are studied in [26].…”
Section: Introductionmentioning
confidence: 99%