We consider the problem of threshold secret sharing in groups with hierarchical structure. In such settings, the secret is shared among a group of participants that is partitioned into levels. The access structure is then determined by a sequence of threshold requirements: a subset of participants is authorized if it has at least k0 members from the highest level, as well as at least k1> k0 members from the two highest levels and so forth. Such problems may occur in settings where the participants differ in their authority or level of confidence and the presence of higher level participants is imperative to allow the recovery of the common secret. Even though secret sharing in hierarchical groups has been studied extensively in the past,...
Due to the rapid growth of the next generation networking and system technologies, computer net-work...
Abstract. We present a threshold secret sharing scheme based on poly-nomial interpolation and the Di...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
Abstract. We consider the problem of threshold secret sharing in groups with hierarchical structure....
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
A secret sharing scheme divides a secret into multiple shares by a dealer and shared among sharehold...
Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1,...
In this paper there are presented algorithms for multilevel hierarchical threshold secret sharing sc...
Abstract Secret sharing schemes have been well studied and widely used in different aspects of real ...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
In this work we provide a framework for dynamic secret sharing and present the first dynamic and ver...
[[abstract]]Generalized secret sharing is a method of constructing secret sharing from the perspecti...
Quite recently, Tassa introduced an ideal and perfect secret sharing scheme realizing conjunctive hi...
Due to the rapid growth of the next generation networking and system technologies, computer net-work...
Abstract. We present a threshold secret sharing scheme based on poly-nomial interpolation and the Di...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
Abstract. We consider the problem of threshold secret sharing in groups with hierarchical structure....
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
A secret sharing scheme divides a secret into multiple shares by a dealer and shared among sharehold...
Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1,...
In this paper there are presented algorithms for multilevel hierarchical threshold secret sharing sc...
Abstract Secret sharing schemes have been well studied and widely used in different aspects of real ...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
In this work we provide a framework for dynamic secret sharing and present the first dynamic and ver...
[[abstract]]Generalized secret sharing is a method of constructing secret sharing from the perspecti...
Quite recently, Tassa introduced an ideal and perfect secret sharing scheme realizing conjunctive hi...
Due to the rapid growth of the next generation networking and system technologies, computer net-work...
Abstract. We present a threshold secret sharing scheme based on poly-nomial interpolation and the Di...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...