Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special class of secret sharing schemes, namely, multiplicative linear secret sharing schemes (LSSSs), are studied. Such schemes are known to enable multiparty computation protocols secure against general (nonthreshold) adversaries. Two open problems related to the complexity of multiplicative LSSSs are considered in this paper. The first one deals with strongly multiplicative LSSSs. As opposed to the case of mul-tiplicative LSSSs, it is not known whether there is an efficient method to transform an LSSS into a strongly multiplicative LSSS for the same access structure with ...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
The characterization of the access structures of ideal secret sharing schemes is one of the main op...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
The matroid associated to a linear code is the representable matroid that is defined by the columns ...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
Multipartite secret sharing schemes are those having a multipartite access structure, in which the s...
The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the ...
Strongly multiplicative linear secret sharing schemes (LSSS) have been a powerful tool for construct...
Secret-sharing schemes are a tool used in many cryptographic protocols. In these schemes, a dealer h...
One of the main open problems in secret sharing is the characterization of the access structures of...
In secret sharing, the exact characterization of ideal access structures is a longstanding open prob...
In a secret-sharing scheme, a secret value is distributed among a set of parties by giving each part...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
The characterization of the access structures of ideal secret sharing schemes is one of the main op...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
The matroid associated to a linear code is the representable matroid that is defined by the columns ...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
Multipartite secret sharing schemes are those having a multipartite access structure, in which the s...
The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the ...
Strongly multiplicative linear secret sharing schemes (LSSS) have been a powerful tool for construct...
Secret-sharing schemes are a tool used in many cryptographic protocols. In these schemes, a dealer h...
One of the main open problems in secret sharing is the characterization of the access structures of...
In secret sharing, the exact characterization of ideal access structures is a longstanding open prob...
In a secret-sharing scheme, a secret value is distributed among a set of parties by giving each part...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
The characterization of the access structures of ideal secret sharing schemes is one of the main op...