A Distributed Secret Sharing Protocol (DSSP for short) allows a dealer to share multiple secrets among a set of users by storing the shares on storage nodes distributed over a public insecure network. Users can later download the shares from the nodes they can access, in order to reconstruct the secrets (each user is allowed to reconstruct exactly one secret). In this paper we propose three contributions: we first carefully analyze the security requirements for DSSPs and we show that if the shared secrets are statistically dependent, then no DSSP satisfying either the weak secrecy requirement or the perfect secrecy one can exist. Then, we propose two new definitions of security for DSSPs, which also take into account the statis...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...
A Distributed Secret Sharing Protocol (DSSP for short) allows a dealer to share multiple secrets ...
Distributed Secret Sharing is a (multi) secret sharing model in which the shares are distributed ove...
Distributed Secret Sharing is a (multi) secret sharing model in which the shares are distributed ove...
In Distributed Secret Sharing schemes, secrets are encoded with shares distributed over multiple nod...
In Distributed Secret Sharing schemes, secrets are encoded with shares distributed over multiple nod...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
. We propose a new construction for computationally secure secret sharing schemes with general acces...
[[abstract]]A secret sharing scheme is a method which allows a secret to be shared among a finite se...
Secret sharing is a mechanism by which a trusted dealer holding a secret “splits ” the secret into m...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
AbstractLet P be a set of participants sharing a secret from a set of secrets. A secret sharing sche...
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...
A Distributed Secret Sharing Protocol (DSSP for short) allows a dealer to share multiple secrets ...
Distributed Secret Sharing is a (multi) secret sharing model in which the shares are distributed ove...
Distributed Secret Sharing is a (multi) secret sharing model in which the shares are distributed ove...
In Distributed Secret Sharing schemes, secrets are encoded with shares distributed over multiple nod...
In Distributed Secret Sharing schemes, secrets are encoded with shares distributed over multiple nod...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
. We propose a new construction for computationally secure secret sharing schemes with general acces...
[[abstract]]A secret sharing scheme is a method which allows a secret to be shared among a finite se...
Secret sharing is a mechanism by which a trusted dealer holding a secret “splits ” the secret into m...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
AbstractLet P be a set of participants sharing a secret from a set of secrets. A secret sharing sche...
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...