Secret sharing schemes

3Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Suppose you have a secret s which you wish to share amongst a set P of n parties. You would like certain subsets of the n parties to recover the secret but not others. The classic scenario might be that s is a nuclear launch code and you have four people, the president, the vice-president, the secretary of state and a general in a missile silo.

Cite

CITATION STYLE

APA

Smart, N. P. (2016). Secret sharing schemes. In Information Security and Cryptography (Vol. 0, pp. 403–416). Springer International Publishing. https://doi.org/10.1007/978-3-319-21936-3_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free