Sciweavers

225 search results - page 4 / 45
» Nonperfect Secret Sharing Schemes
Sort
View
AINA
2005
IEEE
14 years 29 days ago
Dynamic Key Generations for Secret Sharing in Access Structures
In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen
DAM
2002
72views more  DAM 2002»
13 years 7 months ago
On the bound for anonymous secret sharing schemes
In anonymous secret sharing schemes, the secret can be reconstructed without knowledge of which participants hold which shares. In this paper, we derive a tighter lower bound on t...
Wataru Kishimoto, Koji Okada, Kaoru Kurosawa, Waka...
TCC
2010
Springer
176views Cryptology» more  TCC 2010»
14 years 4 months ago
Ideal Hierarchical Secret Sharing Schemes
The search of efficient constructions of ideal secret sharing schemes for families of nonthreshold access structures that may have useful applications has attracted a lot of atten...
Oriol Farràs, Carles Padró
CRYPTO
2006
Springer
232views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
Abstract. We introduce algebraic geometric techniques in secret sharing and in secure multi-party computation (MPC) in particular. The main result is a linear secret sharing scheme...
Hao Chen, Ronald Cramer
IACR
2011
88views more  IACR 2011»
12 years 7 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...