1981
DOI: 10.1145/358746.358762
|View full text |Cite
|
Sign up to set email alerts
|

On sharing secrets and Reed-Solomon codes

Abstract: Shamir's scheme for sharing secrets is closely related to Reed-Solomon coding schemes. Decoding algorithms for Reed-Solomon codes provide extensions and generalizations of Shamir's method.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
299
0
3

Year Published

2003
2003
2016
2016

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 513 publications
(302 citation statements)
references
References 2 publications
0
299
0
3
Order By: Relevance
“…In the case of malicious parties, the degree reduction is much more complex and works as long as t < n/3. In order to obtain some intuition as to why it is needed than t < n/3, observe that a Shamir secret sharing can also be viewed as a Reed-Solomon code of the polynomial [23]. With a polynomial of degree t, it is possible to correct up (n − t − 1)/2 errors.…”
Section: The Bgw Protocolmentioning
confidence: 99%
“…In the case of malicious parties, the degree reduction is much more complex and works as long as t < n/3. In order to obtain some intuition as to why it is needed than t < n/3, observe that a Shamir secret sharing can also be viewed as a Reed-Solomon code of the polynomial [23]. With a polynomial of degree t, it is possible to correct up (n − t − 1)/2 errors.…”
Section: The Bgw Protocolmentioning
confidence: 99%
“…It was observed as early as 1981 that an ideal (k, n)-threshold secret-sharing scheme can be interpreted as a Reed-Solomon code [20].…”
Section: (K N)-threshold Schemes and Reed-solomon Codesmentioning
confidence: 99%
“…Therefore, given the vector of shares possessed by the participants in a (k, n) threshold scheme we can recover the corresponding secret, even if up to t of the participants' shares have been corrupted (i.e. replaced by a different element of GF(q)), provided n − k ≥ 2t [20]. Techniques for performing such error correction for threshold secret-sharing schemes have received a certain amount of attention in the literature [23,25,26].…”
Section: (K N)-threshold Schemes and Reed-solomon Codesmentioning
confidence: 99%
See 2 more Smart Citations