Computationally Secure Robust Multi-secret Sharing for General Access Structure
Citations
6 citations
Cites background from "Computationally Secure Robust Multi..."
...CISS schemes identify cheaters who modify their shares during reconstruction of the secret; [1, 7, 11, 13, 15, 16, 19, 22, 25, 30] are some of the many works in CISS schemes....
[...]
References
14,340 citations
"Computationally Secure Robust Multi..." refers background in this paper
...Blakley [2] and Shamir [19], in 1979, independently, came out with a scheme known as (t, n) threshold secret sharing scheme....
[...]
3,184 citations
"Computationally Secure Robust Multi..." refers background in this paper
...Blakley [2] and Shamir [19], in 1979, independently, came out with a scheme known as (t, n) threshold secret sharing scheme....
[...]
1,061 citations
671 citations
"Computationally Secure Robust Multi..." refers background in this paper
...This observation led to robust secret sharing schemes [14, 16]....
[...]
275 citations
"Computationally Secure Robust Multi..." refers background in this paper
...Most of the robust secret sharing schemes proposed and analysed so far enjoy unconditional (or information-theoretic) security [16, 18],whichmeans that the value of the shared secret is hidden to a computationally unbounded adversarywho controls a subset of users....
[...]
...This observation led to robust secret sharing schemes [14, 16]....
[...]