A secret sharing scheme divides a secret into multiple shares by a dealer and shared among shareholders in such a way that any authorized subset of share-holders can reconstruct the secret; whereas any un-authorized subset of share-holders cannot recover the secret. If the maximal length of shares is equal to the length of the secret in a secret sharing scheme, the scheme is called ideal. If the shares corresponding to each un-authorized subset provide absolutely no information, in the information-theoretic sense, the scheme is called per-fect. Shamir proposed the first (t, n) threshold secret sharing scheme and it is ideal and perfect. In this paper, we propose two modifications of Shamir’s secret sharing scheme. In our first modification,...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1,...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
We consider secret sharing schemes which, through an initial issuing of shares to a group of partici...
In this paper, we investigate a new concept, called share selectable secret sharing, where no unauth...
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
Abstract: We prove that a known approach to improve Shamir's celebrated secret sharing scheme; i.e.,...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1,...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
We consider secret sharing schemes which, through an initial issuing of shares to a group of partici...
In this paper, we investigate a new concept, called share selectable secret sharing, where no unauth...
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
Abstract: We prove that a known approach to improve Shamir's celebrated secret sharing scheme; i.e.,...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...