Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure
Abstract
References
- Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure
Recommendations
Vector space secret sharing and an efficient algorithm to construct a ϕ function
ACMSE '13: Proceedings of the 51st annual ACM Southeast ConferenceThe threshold scheme, the monotone circuit construction, and the vector space construction are some of the well-known secret sharing schemes in cryptography. The threshold and monotone circuit secret sharing schemes are fairly easy to construct for any ...
On a Fast (k,n)-Threshold Secret Sharing Scheme
In Shamir's ( k, n )-threshold secret sharing scheme (threshold scheme) [1], a heavy computational cost is required to make n shares and recover the secret from k shares. As a solution to this problem, several fast threshold schemes have been proposed. ...
A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
ISC '08: Proceedings of the 11th international conference on Information SecurityIn Shamir's (<em>k</em>,<em>n</em>)-threshold secret sharing scheme (threshold scheme), a heavy computational cost is required to make <em>n</em>shares and recover the secret. As a solution to this problem, several fast threshold schemes have been ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/492c9c66-818c-4d3c-b552-a3f1022167b2/2897795.cover.jpg)
- General Chairs:
- Joseph P. Trien,
- Stacy J. Prowell,
- John R. Goodall,
- Program Chair:
- Robert A. Bridges
In-Cooperation
- Oak Ridge National Laboratory
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 104Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in