Lecture Notes in Computer Science
DOI: 10.1007/3-540-39466-4_27
|View full text |Cite
|
Sign up to set email alerts
|

How to Share a Secret

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
128
0

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 204 publications
(128 citation statements)
references
References 0 publications
0
128
0
Order By: Relevance
“…They use biometric for IBE to generate , A k n -threshold scheme as a method of sharing a secret S among a set of n participants in such a way that any k participants can compute the value of the secret, but no group of k − 1 or fewer can do so. The Chinese remainder theorem can be used to construct the secret S like in Mignotte's [9] and Asmuth-Bloom's Schemes [10]. However, it differs, as the secret points to one message, and k shares are needed to solve it using CRT.…”
Section: Background and Related Workmentioning
confidence: 99%
“…They use biometric for IBE to generate , A k n -threshold scheme as a method of sharing a secret S among a set of n participants in such a way that any k participants can compute the value of the secret, but no group of k − 1 or fewer can do so. The Chinese remainder theorem can be used to construct the secret S like in Mignotte's [9] and Asmuth-Bloom's Schemes [10]. However, it differs, as the secret points to one message, and k shares are needed to solve it using CRT.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In a ( , ) threshold secret-sharing scheme, the secret is divided into shares so that it can only be recovered with or more than shares, but fewer than shares cannot reveal any information of the secret. In the past few decades, many secret-sharing schemes have been proposed in the literature, and three major approaches can be used to design them: Shamir's approach [1] based on the univariate polynomial, Blakely's approach [2] based on the hyperplane geometry, and Mignotte/AsmuthBloom approach [3,4] based on the Chinese Remainder Theorem (CRT).…”
Section: Introductionmentioning
confidence: 99%
“…We are going to use the elementary additive secret sharing but also secret sharing based on Shamir secret sharing as in [1,2] and the BGW method [3,4]. We use also the Chinese Remainder Theorem (see [2] and [5]). In the area of multiparty computation, five papers [6][7][8][9][10] deserve special attention.…”
Section: Introductionmentioning
confidence: 99%