In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the secret key. In this paper, we proposed an efficient scheme for secret sharing based upon access structures. We use one-way hash functions to reduce the cost of secret sharing scheme. The presented scheme is easy and efficient, so it is suitable for many real applications
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
Due to the rapid growth of the next generation networking and system technologies, computer net-work...
Secret sharing schemes are very important techniques for the key management. To provide more efficie...
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access struc...
AbstractIn this work, a renewable, multi-use, multi-secret sharing scheme for general access structu...
. We propose a new construction for computationally secure secret sharing schemes with general acces...
Abstract. Secret sharing schemes with general monotone access struc-tures have been widely discussed...
[[abstract]]Generalized secret sharing is a method of constructing secret sharing from the perspecti...
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
AbstractIn traditional group key transfer protocol, the key generation center randomly selects a ses...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...
Secret sharing schemes with general monotone access structures have been widely discussed in the lit...
In general, traditional secret sharing threshold schemes require substantial computation when recove...
[[abstract]]A secret sharing scheme is a method which allows a secret to be shared among a finite se...
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
Due to the rapid growth of the next generation networking and system technologies, computer net-work...
Secret sharing schemes are very important techniques for the key management. To provide more efficie...
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access struc...
AbstractIn this work, a renewable, multi-use, multi-secret sharing scheme for general access structu...
. We propose a new construction for computationally secure secret sharing schemes with general acces...
Abstract. Secret sharing schemes with general monotone access struc-tures have been widely discussed...
[[abstract]]Generalized secret sharing is a method of constructing secret sharing from the perspecti...
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
AbstractIn traditional group key transfer protocol, the key generation center randomly selects a ses...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...
Secret sharing schemes with general monotone access structures have been widely discussed in the lit...
In general, traditional secret sharing threshold schemes require substantial computation when recove...
[[abstract]]A secret sharing scheme is a method which allows a secret to be shared among a finite se...
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
Due to the rapid growth of the next generation networking and system technologies, computer net-work...