Requirements for group independent linear threshold secret sharing schemes

0Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In a t out of n threshold scheme, any subset of t or more participants can compute the secret key k, while subsets of t – 1 or less participants cannot compute k. Some schemes are designed for specific algebraic structures, for example finite fields. Whereas other schemes can be used with any finite abelian group. In [24], the definition of group independent sharing schemes was introduced.In this paper, we develop bounds for group independent t out of n threshold schemes. The bounds will be lower bounds which discuss how many subshares are required to achieve a group independent linear threshold scheme. In particular, we will show that our bounds for the n – 1 out of n threshold schemes are tight for infinitely many n.

Cite

CITATION STYLE

APA

King, B. (2002). Requirements for group independent linear threshold secret sharing schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2384, pp. 89–106). Springer Verlag. https://doi.org/10.1007/3-540-45450-0_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free