2005
DOI: 10.1109/tit.2004.840857
|View full text |Cite
|
Sign up to set email alerts
|

Updating the Parameters of a Threshold Scheme by Minimal Broadcast

Abstract: Abstract-Threshold schemes allow secret data to be protected among a set of participants in such a way that only a prespecified threshold of participants can reconstruct the secret from private information (shares) distributed to them on a system setup using secure channels. We consider the general problem of designing unconditionally secure threshold schemes whose defining parameters (the threshold and the number of participants) can later be changed by using only public channel broadcast messages. In this pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(16 citation statements)
references
References 15 publications
0
16
0
Order By: Relevance
“…The rst of such a scheme was introduced by Blakley and Shamir, independently, in 1979 [5,6]. Since then, some new features have been added to the secret sharing schemes such as veri ability of the shares [7,8], resistance of the scheme in the presence of a number of cheaters [9,10], and dynamic change of the threshold and/or the number of participants [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…The rst of such a scheme was introduced by Blakley and Shamir, independently, in 1979 [5,6]. Since then, some new features have been added to the secret sharing schemes such as veri ability of the shares [7,8], resistance of the scheme in the presence of a number of cheaters [9,10], and dynamic change of the threshold and/or the number of participants [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…Later, various features like verifiability of the shares [3], resistance against the presence of a number of cheaters [4], dynamic change of the threshold and the number of participants [5] were added to the threshold secret sharing scheme.…”
Section: Introductionmentioning
confidence: 99%
“…The problem of making more general changes to an access policy in Model 6 Type C environments has been considered in [1]. Let U be a family of access structures.…”
Section: Making General Changes To the Access Policymentioning
confidence: 99%
“…In [1] this problem was investigated more closely for the case of threshold schemes that require just one change. Bounds were proven for the minimal amount of broadcast information that needs to be used for threshold schemes with minimal secret storage that are changeable to U for the entire range of possible sets U (where the only restriction was that U defined a family of threshold access structures).…”
Section: Making General Changes To the Access Policymentioning
confidence: 99%
See 1 more Smart Citation