In this work we provide a framework for dynamic secret sharing and present the first dynamic and verifiable hierarchical secret sharing scheme based on Birkhoff interpolation. Since the scheme is dynamic it allows, without reconstructing the message distributed, to add and remove shareholders, to renew shares, and to modify the conditions for accessing the message. Furthermore, each shareholder can verify its share received during these algorithms protecting itself against malicious dealers and shareholders. While these algorithms were already available for classical Lagrange interpolation based secret sharing, corresponding techniques for Birkhoff interpolation based schemes were missing. Note that Birkhoff interpolation is currently the o...
Abstract Secret sharing schemes have been well studied and widely used in different aspects of real ...
Preserving data confidentiality in clouds is a key issue. Secret Sharing, a cryptographic primitive ...
Threshold secret sharing schemes encode data into several shares such that a threshold number of sha...
Hierarchical secret sharing schemes distribute a message to a set of shareholders with different rec...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
Abstract. We consider the problem of threshold secret sharing in groups with hierarchical structure....
We propose the first hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer...
We propose the first hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer...
We propose the first hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer...
In this paper there are presented algorithms for multilevel hierarchical threshold secret sharing sc...
A secret sharing scheme divides a secret into multiple shares by a dealer and shared among sharehold...
The concept of social secret sharing (SSS) was introduced in 2010 by Nojoumian et al. [1,2]. In this...
AbstractWe consider secret sharing schemes in which the dealer is able (after a preprocessing stage)...
[[abstract]]In this paper, we propose a dynamic threshold and verifiable multi-secret sharing scheme...
Abstract Secret sharing schemes have been well studied and widely used in different aspects of real ...
Preserving data confidentiality in clouds is a key issue. Secret Sharing, a cryptographic primitive ...
Threshold secret sharing schemes encode data into several shares such that a threshold number of sha...
Hierarchical secret sharing schemes distribute a message to a set of shareholders with different rec...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
Abstract. We consider the problem of threshold secret sharing in groups with hierarchical structure....
We propose the first hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer...
We propose the first hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer...
We propose the first hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer...
In this paper there are presented algorithms for multilevel hierarchical threshold secret sharing sc...
A secret sharing scheme divides a secret into multiple shares by a dealer and shared among sharehold...
The concept of social secret sharing (SSS) was introduced in 2010 by Nojoumian et al. [1,2]. In this...
AbstractWe consider secret sharing schemes in which the dealer is able (after a preprocessing stage)...
[[abstract]]In this paper, we propose a dynamic threshold and verifiable multi-secret sharing scheme...
Abstract Secret sharing schemes have been well studied and widely used in different aspects of real ...
Preserving data confidentiality in clouds is a key issue. Secret Sharing, a cryptographic primitive ...
Threshold secret sharing schemes encode data into several shares such that a threshold number of sha...