2009 Fifth International Conference on Information Assurance and Security 2009
DOI: 10.1109/ias.2009.279
|View full text |Cite
|
Sign up to set email alerts
|

Ideal Perfect Multilevel Threshold Secret Sharing Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 8 publications
0
13
0
Order By: Relevance
“…Shamir's secret sharing scheme is called a perfect scheme simply because the size of the produced shares is exactly the same regardless of the number of the participant servers [1]. This perfect scheme has been used extensively by many researchers to produce various security approaches [2][3][4]. As a matter of fact, Kurihara et.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Shamir's secret sharing scheme is called a perfect scheme simply because the size of the produced shares is exactly the same regardless of the number of the participant servers [1]. This perfect scheme has been used extensively by many researchers to produce various security approaches [2][3][4]. As a matter of fact, Kurihara et.…”
Section: Related Workmentioning
confidence: 99%
“…Lin, C et. al [4] made two modifications to Shamir's scheme; the first adjustments consists of allowing the servers to store their share as well as the (x,y) coordinates, while the second adjustment consists of using a polynomial of degree higher than the threshold to generate data shares. Ito, M. et.…”
Section: Related Workmentioning
confidence: 99%
“…Tassa and Lin et al . proposed their hierarchical secret‐sharing schemes with conjunctive access structure. In their schemes, if the SKR starts from any lower l th level of the hierarchical structure, at least one participant from each upper level must participate in the SKR process.…”
Section: Related Workmentioning
confidence: 99%
“…The existing hierarchical secret‐sharing schemes (e.g. ) have been proposed efficiently. Though these schemes are unconditionally secured, they cannot prevent cheating or malicious attacks from different types of adversaries particularly when the shares are transmitted through wireless unsecured medium.…”
Section: Introductionmentioning
confidence: 99%
“…In hierarchical threshold secret sharing schemes , the secret is shared among a set of participants scriptU={P1,P2,,Pn} who are divided into m hierarchical non‐overlapping subsets (i.e., scriptU=i=1mscriptUi and scriptUiscriptUj= where i ≠ j ) in such a way that the players in scriptUi have more authority to recover the secret than those in scriptUj for 1⩽ j < i ⩽ m . Disjunctive hierarchical threshold secret sharing is one of the important types of hierarchical threshold secret sharing in which the access structure is determined by a strictly decreasing sequence of threshold parameters t 1 > t 2 > ⋯ > t m . In a disjunctive hierarchical threshold secret sharing scheme, a subset of participants A is authorized if there exists some 0⩽ j ⩽ m − 1 such that ||A()i=0jscriptUmitmj.…”
Section: Introductionmentioning
confidence: 99%