2004
DOI: 10.1007/s00022-003-1633-y
|View full text |Cite
|
Sign up to set email alerts
|

Geometrical contributions to secret sharing theory

Abstract: Finite geometry has found applications in many different fields and practical environments. We consider one such application, to the theory of secret sharing, where finite projective geometry has proved to be very useful, both as a modelling tool and as a means to establish interesting results. A secret sharing scheme is a means by which some secret data can be shared among a group of entities in such a way that only certain subsets of the entities can jointly compute the secret. Secret sharing schemes are use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 60 publications
0
9
0
Order By: Relevance
“…From (13) it follows that and so (14) Also by (13), and so (see Section II-A). Since we have and thus…”
Section: B Proof For Theorem 14mentioning
confidence: 88%
See 2 more Smart Citations
“…From (13) it follows that and so (14) Also by (13), and so (see Section II-A). Since we have and thus…”
Section: B Proof For Theorem 14mentioning
confidence: 88%
“…They thus have no information about the secret . To see how to extract the distribution rules of an ideal -threshold scheme from this configuration of points see, for example, [13] or [20].…”
Section: Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…Starting with P G(2, q), the mapping ζ : P G(2, q) → P G(5, q) with ζ([x 0 , x 1 , x 2 ]) = [x 2 0 , x 2 1 , x 2 2 , x 0 x 1 , x 0 x 2 , x 1 x 2 ] defines the quadratic Veronesean V 4 2 . If P = [a, b, c], the planes D(P ) defined above have the equation…”
Section: Examplementioning
confidence: 99%
“…For an overview of secret sharing and the links with geometry we refer to [4]. A recent overview of different adversary models in secret sharing can be found in [6].…”
Section: Secret Sharingmentioning
confidence: 99%