2002
DOI: 10.1016/s0166-218x(01)00236-0
|View full text |Cite
|
Sign up to set email alerts
|

On the bound for anonymous secret sharing schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…In [4], the authors proved that, if t ≥ 3, the equality in Theorem 4.5 does not hold. For t = 2, [4] proved a weak inverse of Theorem 3.2.…”
Section: Theorem 48mentioning
confidence: 99%
See 2 more Smart Citations
“…In [4], the authors proved that, if t ≥ 3, the equality in Theorem 4.5 does not hold. For t = 2, [4] proved a weak inverse of Theorem 3.2.…”
Section: Theorem 48mentioning
confidence: 99%
“…For the clearness of the proof, we first repeat the proof of Theorem 4.5 in [4]. We only consider the case t = 2.…”
Section: Theorem 48mentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, our scheme improves the share size when t ≤ log n − 2 log log n. These schemes have the additional nice property that they are anonymous, that is, the reconstruction of the secret does not depend on the identity of the authorized set. Anonymous secret-sharing schemes were introduced by [47], and were further studied in [14,33,39].…”
Section: Our Resultsmentioning
confidence: 99%
“…A typical application is anonymous sharing of the secret key corresponding to a certain public key. Unfortunately, the constructions of anonymous secret sharing schemes in the literature are not very efficient (in terms of the number of shares that every participant must hold) and existing bounds [4,16] do not leave much hope for forthcoming efficient constructions.…”
Section: Introductionmentioning
confidence: 99%