SETUP in secret sharing schemes using random values
نویسندگان
چکیده
منابع مشابه
SETUP in secret sharing schemes using random values
Secret sharing schemes divide a secret among multiple participants so that only authorized subsets of parties can reconstruct it. We show that SETUP (Secretly Embedded Trapdoor with Universal Protection) attack can be embedded in secret sharing schemes that employ enough randomness to give the attacker an overwhelming advantage to access the secret. In case of ideal schemes, a coalition of a fe...
متن کاملAnonymous Secret Sharing Schemes
In this paper we study anonymous secret sharing schemes. Informally, in an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In such schemes the computation of the secret can be carried out by giving the shares to a black box that does not know the identities of the participants holding those shares. Phillips and Phillips ...
متن کاملOn Secret Sharing Schemes
The concept of secret sharing has been introduced independently by Shamir and Blakley, as a tool to protect a secret from getting exposed or from being lost. It allows a so-called dealer to share a secret among the members of a set P , which are usually called players or participants, in such a way that only certain specified subsets of players are able to reconstruct the secret while smaller s...
متن کاملCompounding secret sharing schemes
In this paper we introduce the class of composite access structures for secret sharing. We also provide secret sharing schemes realizing these structures and study their information rates. As a particular case of this construction, we present the subclass of iterated threshold schemes, a large class of ideal secret sharing schemes.
متن کاملQuantum Secret Sharing Schemes
Nascimento et al. [19] introduced a quantum information theoretical model for Quantum Secret Sharing (QSS) schemes. In this thesis, we describe existing schemes, such as the construction using Monotone Span Programs (MSPs) [16], according to this model. Moreover, the correctness of these schemes is proved in an information theoretical way. In particular, we consider the so-called pure state QSS...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2016
ISSN: 1939-0114
DOI: 10.1002/sec.1755