Compounding secret sharing schemes

E Martínez-Moro, J Mozo-Fernández… - Cryptology ePrint …, 2003 - eprint.iacr.org
… the subclass of iterated threshold schemes, a large class of ideal secret sharing schemes. …
In order to construct a secret sharing scheme for Γ, we can compose secret sharing schemes

Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system

J Wang, C Huang, NN Xiong, J Wang - Information Sciences, 2018 - Elsevier
… overhead in the ABE scheme with unscalable access policy. In … secret sharing scheme
(BLSSS). The scalability of BLSSS provides efficient policy managing interface for ABE scheme. …

On the composition of secret sharing schemes related to codes

I Márquez-Corbella, E Martínez-Moro… - Discrete Mathematics …, 2014 - World Scientific
… of authorized set Γ, there exists a perfect sharing scheme that realizes Γ. Moreover, a secret
sharing scheme is ideal if it is perfect and the domain of shares of each user is S. An access …

Operations over Linear Secret Sharing Schemes

A Slinko - Decision and Game Theory for Security: 10th …, 2019 - Springer
… This paper looks at the ways secret sharing scheme can be modified when organisational …
ideal linear secret sharing schemes and describe how matrices of these linear schemes have …

On the power of nonlinear secret-sharing

A Beimel, Y Ishai - SIAM Journal on Discrete Mathematics, 2005 - SIAM
… In this section we define secret-sharing schemes, linear secretsharing schemes, and span
programs, and briefly discuss the connections between these notions. We end this section …

[PDF][PDF] On the Power of Nonlinear Secret-Sharing Ѓ

A Beimel, Y Ishai - 2005 - Citeseer
… are obtained by composing a finite number of linear secretsharing schemes, possibly over
… A construction of practical secret sharing schemes using linear block codes. In J. Seberry …

An approach to enhance inter-provider roaming through secret sharing and its application to WLANs

U Meyer, J Cordasco, S Wetzel - … of the 3rd ACM international workshop …, 2005 - dl.acm.org
… In this paper, we show how secret sharing can be used to address a … sharing scheme that
represents our non-threshold composite … manner to construct our linear secret sharing scheme. …

[PDF][PDF] AI-Enhanced Secure Multi-Party Computation via Secret Sharing: Advancements and Application

S Alia, A Alib, SA Wadhoc, M Jamild… - Organized by: The …, 2024 - researchgate.net
… to function properly, which, in addition to compounding the complexity of the protocol,
greatly … The secret sharing scheme of Shamir entails a process whereby each participant, 𝑃, …

PSIS-based blind watermarking scheme (PSISBW) with tamper detection

G Kaur, V Patidar, R Agarwal - The Journal of Analysis, 2024 - Springer
Compounding a one-dimensional seed map can overcome such issues. Compounding refers
… The secret sharing scheme in our method is used to create shadows of the watermark and …

Outsourcing the decryption of {ABE} ciphertexts

M Green, S Hohenberger, B Waters - 20th USENIX security symposium …, 2011 - usenix.org
… These difficulties are compounded if a party’s credentials … set S /∈ A, the secret s should be
information theoretically … ” vector for any linear secret sharing scheme. For any satisfying set …