A secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret, but any non-qualified subset has absolutely no information on the secret. The set of all qualified subsets defines the access structure to the secret. Sharing schemes are useful in the management of cryptographic keys and in multy-party secure protocols. We analyze the relationships among the entropies of the sample spaces from which the shares and the secret are chosen. We show that there are access structures with 4 participants for which any secret sharing scheme must give to a participant a share at least 50% greater than the secret size. This is the first proof that there exist acces...
In classical secret sharing schemes a dealer shares a secret among a set of participants in such a w...
In classical secret sharing schemes a dealer shares a secret among a set of participants in such a w...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
AbstractLet P be a set of participants sharing a secret from a set of secrets. A secret sharing sche...
AbstractIn this paper we study anonymous secret sharing schemes. Informally, in an anonymous secret ...
In classical secret sharing schemes a dealer shares a secret among a set of participants in such a w...
In classical secret sharing schemes a dealer shares a secret among a set of participants in such a w...
In classical secret sharing schemes a dealer shares a secret among a set of participants in such a w...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
AbstractLet P be a set of participants sharing a secret from a set of secrets. A secret sharing sche...
AbstractIn this paper we study anonymous secret sharing schemes. Informally, in an anonymous secret ...
In classical secret sharing schemes a dealer shares a secret among a set of participants in such a w...
In classical secret sharing schemes a dealer shares a secret among a set of participants in such a w...
In classical secret sharing schemes a dealer shares a secret among a set of participants in such a w...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...