2011
DOI: 10.1007/978-3-642-20901-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Secret-Sharing Schemes: A Survey

Abstract: Abstract. A secret-sharing scheme is a method by which a dealer distributes shares to parties such that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes are important tools in cryptography and they are used as a building box in many secure protocols, e.g., general protocol for multiparty computation, Byzantine agreement, threshold cryptography, access control, attribute-based encryption, and generalized oblivious transfer. In this survey, we will describe the most important… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
328
0
2

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 523 publications
(330 citation statements)
references
References 77 publications
(142 reference statements)
0
328
0
2
Order By: Relevance
“…[5,Section 5]). Most of these works rely on Shannon-type inequalities on entropy of random variables, which do not seem applicable to our setting.…”
Section: Additional Related Workmentioning
confidence: 99%
“…[5,Section 5]). Most of these works rely on Shannon-type inequalities on entropy of random variables, which do not seem applicable to our setting.…”
Section: Additional Related Workmentioning
confidence: 99%
“…T 1 We consider in this case the structures with hmin Γ = {(x 1 , 0, 0), (y 1 , y 2 , y 3 )} such that y 2 = |Π 2 | if y 1 = 0, and y 2 > 0, and 1 < y 3 = |Π 3 | − 1, and x 1 = y 1 + y 2 + y 3 − 1.…”
Section: Ideal Weighted Threshold Access Structuresmentioning
confidence: 99%
“…Nevertheless, it seems clear that we cannot expect to find efficient secret sharing schemes for all access structures. The reader is referred to the recent survey by Beimel [1] on this topic. Because of that, the construction of ideal secret sharing schemes for families of access structures with interesting properties for the applications is worth considering.…”
Section: Introductionmentioning
confidence: 99%
“…SMC is one of these methods. [7][8][9][10] Most of the works in SMC are developed on applying the model of SMC on different data distributions such as vertically, horizontally and arbitrarily partitioned data. [11][12][13][14][15] They are the methods that each server performs its processing for the subset of data.…”
Section: Introductionmentioning
confidence: 99%