To strengthen the resistance of countermeasures based on secret sharing,several works have suggested to use the scheme introduced by Shamir in 1978, which proposes to use the evaluation of a random d-degree polynomial into n ≥ d + 1 public points to share the sensitive data. Applying the same principles used against the classical Boolean sharing, all these works have assumed that the most efficient attack strategy was to exploit the minimum number of shares required to rebuild the sensitive value; which is d + 1 if the reconstruction is made with Lagrange’s interpolation. In this paper, we highlight first an important difference between Boolean and Shamir’s sharings which implies that, for some signal-to-noise ratio, it is more advantageous...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error co...
Due to the recent development of computers and computer networks, huge amount of digital data can ea...
To strengthen the resistance of countermeasures based on secret sharing, several works have suggeste...
International audienceTo strengthen the resistance of countermeasures based on secret sharing, sever...
We present a novel way to implement the secret sharing based family of revocation schemes of Naor an...
We present a method for converting shares of a secret into shares of the same secret in a different ...
We present a novel way to implement the secret sharing based family of revocation schemes of Naor an...
We present a method for converting shares of a secret into shares of the same secret in a different ...
We prove that a known general approach to improve Shamir’s celebrated secret sharing scheme; i.e., a...
We prove that a known approach to improve Shamir\u27s celebrated secret sharing scheme; i.e., adding...
Abstract. In this paper, we investigate the problem of increasing the threshold parameter of the Sha...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
In 2016, Guruswami and Wootters showed Shamir’s secret-sharing scheme defined over an extension fiel...
Abstract. We present a novel method for constructing linear secret sharing schemes (LSSS) from linea...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error co...
Due to the recent development of computers and computer networks, huge amount of digital data can ea...
To strengthen the resistance of countermeasures based on secret sharing, several works have suggeste...
International audienceTo strengthen the resistance of countermeasures based on secret sharing, sever...
We present a novel way to implement the secret sharing based family of revocation schemes of Naor an...
We present a method for converting shares of a secret into shares of the same secret in a different ...
We present a novel way to implement the secret sharing based family of revocation schemes of Naor an...
We present a method for converting shares of a secret into shares of the same secret in a different ...
We prove that a known general approach to improve Shamir’s celebrated secret sharing scheme; i.e., a...
We prove that a known approach to improve Shamir\u27s celebrated secret sharing scheme; i.e., adding...
Abstract. In this paper, we investigate the problem of increasing the threshold parameter of the Sha...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
In 2016, Guruswami and Wootters showed Shamir’s secret-sharing scheme defined over an extension fiel...
Abstract. We present a novel method for constructing linear secret sharing schemes (LSSS) from linea...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error co...
Due to the recent development of computers and computer networks, huge amount of digital data can ea...