Compounding secret sharing schemes
E Martínez-Moro, J Mozo-Fernández… - Cryptology ePrint …, 2003 - eprint.iacr.org
… the subclass of iterated threshold schemes, a large class of ideal secret sharing schemes. …
In order to construct a secret sharing scheme for Γ, we can compose secret sharing schemes …
In order to construct a secret sharing scheme for Γ, we can compose secret sharing schemes …
Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system
J Wang, C Huang, NN Xiong, J Wang - Information Sciences, 2018 - Elsevier
… overhead in the ABE scheme with unscalable access policy. In … secret sharing scheme
(BLSSS). The scalability of BLSSS provides efficient policy managing interface for ABE scheme. …
(BLSSS). The scalability of BLSSS provides efficient policy managing interface for ABE scheme. …
On the composition of secret sharing schemes related to codes
I Márquez-Corbella, E Martínez-Moro… - Discrete Mathematics …, 2014 - World Scientific
… of authorized set Γ, there exists a perfect sharing scheme that realizes Γ. Moreover, a secret
sharing scheme is ideal if it is perfect and the domain of shares of each user is S. An access …
sharing scheme is ideal if it is perfect and the domain of shares of each user is S. An access …
Operations over Linear Secret Sharing Schemes
A Slinko - Decision and Game Theory for Security: 10th …, 2019 - Springer
… This paper looks at the ways secret sharing scheme can be modified when organisational …
ideal linear secret sharing schemes and describe how matrices of these linear schemes have …
ideal linear secret sharing schemes and describe how matrices of these linear schemes have …
On the power of nonlinear secret-sharing
… In this section we define secret-sharing schemes, linear secretsharing schemes, and span
programs, and briefly discuss the connections between these notions. We end this section …
programs, and briefly discuss the connections between these notions. We end this section …
[PDF][PDF] On the Power of Nonlinear Secret-Sharing Ѓ
A Beimel, Y Ishai - 2005 - Citeseer
… are obtained by composing a finite number of linear secretsharing schemes, possibly over
… A construction of practical secret sharing schemes using linear block codes. In J. Seberry …
… A construction of practical secret sharing schemes using linear block codes. In J. Seberry …
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs
U Meyer, J Cordasco, S Wetzel - … of the 3rd ACM international workshop …, 2005 - dl.acm.org
… In this paper, we show how secret sharing can be used to address a … sharing scheme that
represents our non-threshold composite … manner to construct our linear secret sharing scheme. …
represents our non-threshold composite … manner to construct our linear secret sharing scheme. …
[PDF][PDF] AI-Enhanced Secure Multi-Party Computation via Secret Sharing: Advancements and Application
S Alia, A Alib, SA Wadhoc, M Jamild… - Organized by: The …, 2024 - researchgate.net
… to function properly, which, in addition to compounding the complexity of the protocol,
greatly … The secret sharing scheme of Shamir entails a process whereby each participant, 𝑃, …
greatly … The secret sharing scheme of Shamir entails a process whereby each participant, 𝑃, …
PSIS-based blind watermarking scheme (PSISBW) with tamper detection
… Compounding a one-dimensional seed map can overcome such issues. Compounding refers
… The secret sharing scheme in our method is used to create shadows of the watermark and …
… The secret sharing scheme in our method is used to create shadows of the watermark and …
Outsourcing the decryption of {ABE} ciphertexts
… These difficulties are compounded if a party’s credentials … set S /∈ A, the secret s should be
information theoretically … ” vector for any linear secret sharing scheme. For any satisfying set …
information theoretically … ” vector for any linear secret sharing scheme. For any satisfying set …
Related searches
- secret sharing schemes access structures
- secret sharing schemes detection of cheaters
- secret sharing schemes linear codes
- efficient secret sharing schemes
- perfect secret sharing schemes
- universally ideal secret sharing schemes
- nonperfect secret sharing schemes
- secret sharing schemes authorized subsets
- anonymous secret sharing schemes
- secret sharing schemes minimal qualified subsets
- secret sharing schemes linear construction
- secret sharing schemes linear algebra approach
- secret sharing schemes decomposition construction
- secret sharing schemes infinite sets
- secret shares bounds and techniques
- secret sharing schemes construction methods