We prove that a known general approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an information-theoretic authentication tag to the secret, can make it robust for n parties against any collusion of size δn, for any constant δ∈ (0 , 1 / 2). Shamir’s original scheme is robust for all δ∈ (0 , 1 / 3). Beyond that, we employ the best known list decoding algorithms for Reed-Solomon codes and show that, with high probability, only the correct secret maintains the correct information-theoretic tag if an algebraic manipulation detection (AMD) code is used to tag secrets. This result holds in the so-called “non-rushing” model in which the n shares are submitted simultaneously for reconstruction. We thus obtain a fully explici...
Robust secret sharing enables the reconstruction of a secret-shared message in the presence of up to...
In this paper, we consider three very important issues namely detection, identification and robust...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a t...
We prove that a known approach to improve Shamir\u27s celebrated secret sharing scheme; i.e., adding...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
Abstract: We prove that a known approach to improve Shamir's celebrated secret sharing scheme; i.e.,...
Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbi...
Shamir\u27s celebrated secret sharing scheme provides an efficient method for encoding a secret of a...
We show a robust secret sharing scheme for a maximal threshold t < n/2 that features an optimal over...
Robust secret sharing enables the reconstruction of a secret-shared message in the presence of up to...
In a $t$-out-of-$n$ robust secret sharing scheme, a secret message is shared among $n$ parties who c...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in the...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in the...
In a t-out-of-n robust secret sharing scheme, a secret message is shared among n parties who can rec...
Threshold secret sharing schemes enable a dealer to share a secret among $n$ parties such that only ...
Robust secret sharing enables the reconstruction of a secret-shared message in the presence of up to...
In this paper, we consider three very important issues namely detection, identification and robust...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a t...
We prove that a known approach to improve Shamir\u27s celebrated secret sharing scheme; i.e., adding...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
Abstract: We prove that a known approach to improve Shamir's celebrated secret sharing scheme; i.e.,...
Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbi...
Shamir\u27s celebrated secret sharing scheme provides an efficient method for encoding a secret of a...
We show a robust secret sharing scheme for a maximal threshold t < n/2 that features an optimal over...
Robust secret sharing enables the reconstruction of a secret-shared message in the presence of up to...
In a $t$-out-of-$n$ robust secret sharing scheme, a secret message is shared among $n$ parties who c...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in the...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in the...
In a t-out-of-n robust secret sharing scheme, a secret message is shared among n parties who can rec...
Threshold secret sharing schemes enable a dealer to share a secret among $n$ parties such that only ...
Robust secret sharing enables the reconstruction of a secret-shared message in the presence of up to...
In this paper, we consider three very important issues namely detection, identification and robust...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a t...