This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restriction to the adversary. We first investigate the approach of using commitment to 0 in the renewal phase in order to renew the player’s shares. In the considered model some well known computationally secure protocols (which use this approach) turns out to be vulnerable to a specific attack. We show that this type of attack is applicable also in the unconditional case. Then we extend the attack of D’Arco and Stinson to non-symmetric polynomials, which is applicable even in the mobile adversary model of Herzberg et al. Next the conditions for the security of a proactive scheme u...
In this thesis, four different methods for secret sharing with threshold schemes will be investigate...
In [16], Naor, Pinkas and Reingold introduced schemes in which some groups of servers distribute key...
Proactive secret sharing (PSS) schemes are designed for settings where long-term con-dentiality of s...
This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of ...
The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedi...
Verifiable secret sharing schemes (VSS) are secret sharing schemes dealing with possible cheating by...
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m # ,n # ) acc...
S. Fehr [11] pointed out that denoting the complement ΓA = ∆c A as honest (or good) players structur...
In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in which sha...
Abstract We consider secret sharing schemes in which the dealer is able (after a preprocessing stage...
AbstractWe consider secret sharing schemes in which the dealer is able (after a preprocessing stage)...
Threshold secret sharing schemes encode data into several shares such that a threshold number of sha...
We present a method for converting shares of a secret into shares of the same secret in a different ...
Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to ...
In this thesis, four different methods for secret sharing with threshold schemes will be investigate...
In [16], Naor, Pinkas and Reingold introduced schemes in which some groups of servers distribute key...
Proactive secret sharing (PSS) schemes are designed for settings where long-term con-dentiality of s...
This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of ...
The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedi...
Verifiable secret sharing schemes (VSS) are secret sharing schemes dealing with possible cheating by...
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m # ,n # ) acc...
S. Fehr [11] pointed out that denoting the complement ΓA = ∆c A as honest (or good) players structur...
In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in which sha...
Abstract We consider secret sharing schemes in which the dealer is able (after a preprocessing stage...
AbstractWe consider secret sharing schemes in which the dealer is able (after a preprocessing stage)...
Threshold secret sharing schemes encode data into several shares such that a threshold number of sha...
We present a method for converting shares of a secret into shares of the same secret in a different ...
Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to ...
In this thesis, four different methods for secret sharing with threshold schemes will be investigate...
In [16], Naor, Pinkas and Reingold introduced schemes in which some groups of servers distribute key...
Proactive secret sharing (PSS) schemes are designed for settings where long-term con-dentiality of s...