Multipartite secret sharing by bivariate interpolation
From MaRDI portal
Publication:1015357
DOI10.1007/s00145-008-9027-9zbMath1159.94373OpenAlexW2015101688MaRDI QIDQ1015357
Publication date: 8 May 2009
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-008-9027-9
bivariate interpolationsecret sharingcompartmented access structuresmonotone span programsbivariate Lagrange interpolationhierarchical threshold access structuresmultipartite access structures
Interpolation in approximation theory (41A05) Authentication, digital signatures and secret sharing (94A62)
Related Items
Ideal secret sharing schemes on graph-based $3$-homogeneous access structures, An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem, Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps, Ideal uniform multipartite secret sharing schemes, A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations, Ideal multipartite secret sharing schemes, Efficient integer span program for hierarchical threshold access structure, Communication-efficient proactive secret sharing for dynamic groups with dishonest majorities, Ideal Secret Sharing Schemes for Useful Multipartite Access Structures, Generalized threshold secret sharing and finite geometry, Secret sharing schemes for compartmented access structures, How to share a secret, Extensions of access structures and their cryptographic applications, On the optimization of bipartite secret sharing schemes, Ideal Hierarchical Secret Sharing Schemes, Efficient explicit constructions of compartmented secret sharing schemes, A rational threshold signature model and protocol based on different permissions, Practical (fully) distributed signatures provably secure in the standard model
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Hierarchical threshold secret sharing
- Polynomial interpolation to data on flats in \(\mathbb{R}^d\)
- Secret sharing schemes with bipartite access structure
- How to share a secret
- Fast Probabilistic Algorithms for Verification of Polynomial Identities
- On Lattices Admitting Unique Lagrange Interpolations
- On secret sharing systems
- Ideal Multipartite Secret Sharing Schemes
- Theory of Cryptography