How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems

N/ACitations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Partial key, key safeguarding, and threshold techniques appear to be another example of similar good ideas springing up in several places at nearly the same time — each with a different name and associated terminology. The use of partial key techniques actually appeared in print first in a technical report [Chaum 79] before the key safeguarding techniques were presented at a conference [Blakley 79], and before the threshold schemes were submitted for publication [Shamir 79]. (In fact the author received comments on the technical report from Shamir, along with a draft of the threshold scheme.)

Cite

CITATION STYLE

APA

Chaum, D. (1985). How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 196 LNCS, pp. 481–485). Springer Verlag. https://doi.org/10.1007/3-540-39568-7_40

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free