Traditional secret sharing schemes involve the use of a mutually trusted authority to assist in the generation and distribution of shares that will allow a secret to be protected among a set of participants. In contrast, this paper addresses the problem of establishing a secret sharing scheme for a given access structure without the use of a mutually trusted authority. A general protocol is discussed and several implementations of this protocol are presented. The efficiency of these implementations is considered. The protocol is then refined and constructions are presented for mutually trusted authority free threshold schemes.
CITATION STYLE
Jackson, W. A., Martin, K. M., & O’keefe, C. M. (1995). Efficient secret sharing without a mutually trusted authority. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 921, pp. 183–193). Springer Verlag. https://doi.org/10.1007/3-540-49264-X_15
Mendeley helps you to discover research relevant for your work.