The Capacity Region of Distributed Multi-User Secret Sharing Under Perfect Secrecy
Abstract
References
Index Terms
- The Capacity Region of Distributed Multi-User Secret Sharing Under Perfect Secrecy
Recommendations
Distributed Multi-User Secret Sharing
We consider a distributed secret sharing system that consists of a dealer, n storage nodes, and m users. Each user is given access to a certain subset of storage nodes, where it can download the stored data. The dealer wants to securely convey a specific ...
Ideal Perfect Multilevel Threshold Secret Sharing Scheme
IAS '09: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification, each shareholder keeps both $x$-coordinate ...
Distributed Multi-User Secret Sharing
2018 IEEE International Symposium on Information Theory (ISIT)A distributed secret sharing system is considered that consists of a dealer, <tex>$n$</tex> storage nodes, and <tex>$m$</tex> users. Each user is given access to a certain subset of storage nodes where it can download the data. The dealer wants to ...
Comments
Information & Contributors
Information
Published In
Publisher
IEEE Press
Publication History
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0