In a t-out-of-n robust secret sharing scheme, a secret message is shared among n parties who can reconstruct the message by combining their shares. An adversary can adaptively corrupt up to t of the parties, get their shares, and modify them arbitrarily. The scheme should satisfy privacy, meaning that the adversary cannot learn anything about the shared message, and robustness, meaning that the adversary cannot cause the reconstruction procedure to output an incorrect message. Such schemes are only possible in the case of an honest majority, and here we focus on unconditional security in the maximal corruption setting where n = 2t+ 1. In this scenario, to share an m-bit message with a reconstruction failure probability of at most 2−k, a kno...
Secret sharing scheme is a cryptographic primitive in which a secret is divided into shares and dist...
All known constructions of information theoretic t-out-of-n secret sharing schemes require secure, ...
In this paper, we present an efficient k-out-of-n secret sharing scheme, which can identify up to t ...
In a $t$-out-of-$n$ robust secret sharing scheme, a secret message is shared among $n$ parties who c...
Robust secret sharing enables the reconstruction of a secret-shared message in the presence of up to...
We study robust secret sharing schemes in which between one third and one half of the players are co...
We show a robust secret sharing scheme for a maximal threshold t < n/2 that features an optimal over...
Abstract: We prove that a known approach to improve Shamir's celebrated secret sharing scheme; i.e.,...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
Robust secret sharing enables the reconstruction of a secret-shared message in the presence of up to...
We prove that a known approach to improve Shamir\u27s celebrated secret sharing scheme; i.e., adding...
We show a robust secret sharing scheme for a maximal threshold t < n/2 that features an optimal over...
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the...
We prove that a known general approach to improve Shamir’s celebrated secret sharing scheme; i.e., a...
In this paper, we consider three very important issues namely detection, identification and robust...
Secret sharing scheme is a cryptographic primitive in which a secret is divided into shares and dist...
All known constructions of information theoretic t-out-of-n secret sharing schemes require secure, ...
In this paper, we present an efficient k-out-of-n secret sharing scheme, which can identify up to t ...
In a $t$-out-of-$n$ robust secret sharing scheme, a secret message is shared among $n$ parties who c...
Robust secret sharing enables the reconstruction of a secret-shared message in the presence of up to...
We study robust secret sharing schemes in which between one third and one half of the players are co...
We show a robust secret sharing scheme for a maximal threshold t < n/2 that features an optimal over...
Abstract: We prove that a known approach to improve Shamir's celebrated secret sharing scheme; i.e.,...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
Robust secret sharing enables the reconstruction of a secret-shared message in the presence of up to...
We prove that a known approach to improve Shamir\u27s celebrated secret sharing scheme; i.e., adding...
We show a robust secret sharing scheme for a maximal threshold t < n/2 that features an optimal over...
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the...
We prove that a known general approach to improve Shamir’s celebrated secret sharing scheme; i.e., a...
In this paper, we consider three very important issues namely detection, identification and robust...
Secret sharing scheme is a cryptographic primitive in which a secret is divided into shares and dist...
All known constructions of information theoretic t-out-of-n secret sharing schemes require secure, ...
In this paper, we present an efficient k-out-of-n secret sharing scheme, which can identify up to t ...