Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Randomness recoverable secret sharing schemes - MaRDI portal

Randomness recoverable secret sharing schemes (Q6617634)

From MaRDI portal





scientific article; zbMATH DE number 7925123
Language Label Description Also known as
English
Randomness recoverable secret sharing schemes
scientific article; zbMATH DE number 7925123

    Statements

    Randomness recoverable secret sharing schemes (English)
    0 references
    0 references
    0 references
    0 references
    11 October 2024
    0 references
    The present article deals with the case study of particular models of sharing secrets as well as modal schemes treated from the informational-theoretical and computational perspectives. The main novelty brought by the authors refers to the demonstration of the conclusion that access structures can be treated with RR-SSS. Still, some models of simpler structures did not show an efficient implementation of the model. Also, a connection between RR-SSS and some unidirectional functions is highlighted, by demonstrating the possibility of constructing an RR-SSS scheme that is efficient in the case of descriptive access structures of unidirectional functions. Indeed, there are similar researches in this sense, with the authors' work having a clear way of separating the complexities associated with RR-SSS and SSS, by highlighting their parameterization in the two cases. From the model in which this comparative modality is exposed, the applicability of these models in real cryptographic requirements, where unidirectional functions are analyzed, is evident, which constitutes the essential contribution of this research. The obtained results are applicable in the implementation of informational security structures, but also in certain types of authentication.
    0 references
    secret sharing
    0 references
    randomness recovery
    0 references
    lower bounds
    0 references
    information theoretic security
    0 references
    randomness recoverable attribute based encryption
    0 references
    one way function
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references