Please use this identifier to cite or link to this item:
|Scopus||Web of Science®||Altmetric|
|Title:||Mutually trusted authority-free secret sharing schemes|
|Citation:||Journal of Cryptology, 1997; 10(4):261-289|
|Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe|
|Abstract:||Traditional secret sharing schemes involve the use of a mutually trusted authority to assist in the generation and distribution of shares that will allow a secret to be protected among a set of participants. In contrast, this paper addresses the problem of establishing secret sharing schemes for a given access structure without the use of a mutually trusted authority. A general protocol is discussed and several implementations of this protocol are presented. Several efficiency measures are proposed and we consider how to refine the general protocol in order to improve the efficiency with respect to each of the proposed measures. Special attention is given to mutually trusted authority-free threshold schemes. Constructions are presented for such threshold schemes that are shown to be optimal with respect to each of the proposed efficiency measures.|
|Keywords:||Secret sharing schemes|
|Rights:||© 1997, International Association for Criptologic Research|
|Appears in Collections:||Pure Mathematics publications|
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.