Suppose you have a secret s which you wish to share amongst a set P of n parties. You would like certain subsets of the n parties to recover the secret but not others. The classic scenario might be that s is a nuclear launch code and you have four people, the president, the vice-president, the secretary of state and a general in a missile silo.
CITATION STYLE
Smart, N. P. (2016). Secret sharing schemes. In Information Security and Cryptography (Vol. 0, pp. 403–416). Springer International Publishing. https://doi.org/10.1007/978-3-319-21936-3_19
Mendeley helps you to discover research relevant for your work.