Generalized secret sharing and monotone functions

412Citations
Citations of this article
103Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Secret Sharing from the perspective of threshold schemes has been wellstudied over the past decade. Threshold schemes, however, can only handle a small fraction of the secret sharing functions which we may wish to form. For example, if it is desirable to divide a secret among four participants A, B, C, and D in such a way that either A together with B can reconstruct the secret or C together with D can reconstruct the secret, then threshold schemes (even with weighting) are provably insufficient. This paper will present general methods for constructing secret sharing schemes for any given secret sharing function. There is a natural correspondence between the set of '‘generitlized’' secret sharing functions and the set of monotone functions, and tools developed for simplifying the latter set can be applied equally well to the former set.

Cite

CITATION STYLE

APA

Benaloh, J., & Leichter, J. (1990). Generalized secret sharing and monotone functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 403 LNCS, pp. 27–35). Springer Verlag. https://doi.org/10.1007/0-387-34799-2_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free