A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) which are distributed to users. The secret may be recovered only by certain predetermined groups. In case of compartmented secret sharing, the set of users is partitioned into compartments and the secret can be recovered only if the number of participants from any compartment is greater than a fixed compartment threshold and the total number of participants is greater than a global threshold. In this paper we present a new compartmented secret sharing scheme by extending the Brickell\u27s construction to the case that the global threshold is strictly greater than the sum of the compartment thresholds and we indicate how to use the threshold s...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
A secret sharing scheme derives from a given secret certain shares (or shadows) which are distribute...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) w...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
Abstract Multilevel and compartmented access structures are two important classes of access structur...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
A secret sharing scheme derives from a given secret certain shares (or shadows) which are distribute...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) w...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
Abstract Multilevel and compartmented access structures are two important classes of access structur...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...