. We present a generalization of Shamir's threshold scheme [5]. The Shamir's scheme shows how to divide a key D into n pieces such that it is easily reconstructable from any k pieces, but that even complete knowledge of k \Gamma 1 pieces reveals no information about D. Shamir calls it a (k,n) threshold scheme. We propose a system with s security levels, each of them requiring k l partial keys for computation of a secret key D l for level l. The higher is the security level, the more keys are required. We call our scheme a (k l ; s; n) multithreshold scheme, l = 1; \Delta \Delta \Delta ; s. 1 Introduction We consider the following scenario. A group of ten experts is responsible for operating a protected system. To perform some m...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
[[abstract]]In 2000, Wang et al. proposed a new (t, n) threshold signature scheme with (k, l) thresh...
Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1,...
A multisecret threshold scheme is a system that protects a number of secrets (or keys) among a group...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
The original publication can be found at www.springerlink.comA multisecret threshold scheme is a sys...
[[abstract]]An (m, n) threshold scheme is to decompose the master key K into n secret shadows in suc...
AbstractSecret sharing is an important concept for implementing robust and secure computer systems. ...
In 1979 Shamir and Blakley introduced the concept of secret sharing through threshold schemes. Their...
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
Sensitive electronic data must often be kept confidential over very long periods of time. Known solu...
Abstract. In this paper, we investigate the problem of increasing the threshold parameter of the Sha...
The paper describes an implementation of Shamir secret sharing schemes based on exponentiation in Ga...
With the goal of ensuring availability of security services such as encryption and authentication, w...
In this paper, we propose a new (t,n) threshold scheme. The scheme allows a user to divide portions ...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
[[abstract]]In 2000, Wang et al. proposed a new (t, n) threshold signature scheme with (k, l) thresh...
Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1,...
A multisecret threshold scheme is a system that protects a number of secrets (or keys) among a group...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
The original publication can be found at www.springerlink.comA multisecret threshold scheme is a sys...
[[abstract]]An (m, n) threshold scheme is to decompose the master key K into n secret shadows in suc...
AbstractSecret sharing is an important concept for implementing robust and secure computer systems. ...
In 1979 Shamir and Blakley introduced the concept of secret sharing through threshold schemes. Their...
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
Sensitive electronic data must often be kept confidential over very long periods of time. Known solu...
Abstract. In this paper, we investigate the problem of increasing the threshold parameter of the Sha...
The paper describes an implementation of Shamir secret sharing schemes based on exponentiation in Ga...
With the goal of ensuring availability of security services such as encryption and authentication, w...
In this paper, we propose a new (t,n) threshold scheme. The scheme allows a user to divide portions ...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
[[abstract]]In 2000, Wang et al. proposed a new (t, n) threshold signature scheme with (k, l) thresh...
Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1,...