In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a differ- ent associated access structure. We consider here unconditionally secure schemes with multithreshold access structures. Namely, for every subset P of k users there is a secret key that can only be computed when at least t of them put together their secret information. Coalitions with at most w users with less than t of them in P cannot obtain any information about the secret associated to P. The main parameters to optimize are the length of the shares and the amount of random bits that are needed to set up the distribution of shares, both in relation to the length of the secret. In this paper, we provide lower bo...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
AbstractIn anonymous secret sharing schemes, the secret can be reconstructed without knowledge of wh...
Abstract. In a multisecret sharing scheme, several secret values are distributed among a set of n us...
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and e...
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some...
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
A multi-secret sharing scheme is a protocol to share a number of (arbitrarily related) secrets among...
Abstract—One of the important problems in secret sharing schemes is to establish bounds on the size ...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
The original publication can be found at www.springerlink.comA multisecret threshold scheme is a sys...
A multisecret threshold scheme is a system that protects a number of secrets (or keys) among a group...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
AbstractIn anonymous secret sharing schemes, the secret can be reconstructed without knowledge of wh...
Abstract. In a multisecret sharing scheme, several secret values are distributed among a set of n us...
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and e...
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some...
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
A multi-secret sharing scheme is a protocol to share a number of (arbitrarily related) secrets among...
Abstract—One of the important problems in secret sharing schemes is to establish bounds on the size ...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
The original publication can be found at www.springerlink.comA multisecret threshold scheme is a sys...
A multisecret threshold scheme is a system that protects a number of secrets (or keys) among a group...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
AbstractIn anonymous secret sharing schemes, the secret can be reconstructed without knowledge of wh...