scispace - formally typeset
Journal ArticleDOI

On sharing secrets and Reed-Solomon codes

Reads0
Chats0
TLDR
Decoding algorithms for Reed-Solomon codes provide extensions and generalizations of Shamir's method, which is closely related to Reed- Solomon coding schemes.
Abstract
Shamir's scheme for sharing secrets is closely related to Reed-Solomon coding schemes. Decoding algorithms for Reed-Solomon codes provide extensions and generalizations of Shamir's method.

read more

Citations
More filters
Book ChapterDOI

A Construction of Practical Secret Sharing Schemes using Linear Block Codes

TL;DR: This paper generalizes results from constructions of threshold schemes using linear block codes to construct secret sharing schemes for arbitrary access structure and presents a solution to the problem of retrieving the secret.
Book ChapterDOI

Secure and efficient metering

TL;DR: An environment in which many servers serve an even larger number of clients, and it is required to meter the interaction between servers and clients is considered, based on efficient cryptographic techniques several secure and efficient constructions of metering systems are suggested.
Book ChapterDOI

SCRAPE: Scalable Randomness Attested by Public Entities

TL;DR: In this paper, the authors present a coin tossing protocol for an honest majority that allows for any entity to verify that an output was honestly generated by observing publicly available information (even after the execution is complete), while achieving both guaranteed output delivery and scalability.
Journal ArticleDOI

A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing

TL;DR: A three-layer storage framework based on fog computing that can both take full advantage of cloud storage and protect the privacy of data and is really a powerful supplement to existing cloud storage scheme.
Journal ArticleDOI

Optimum Secret Sharing Scheme Secure against Cheating

TL;DR: A tight lower bound on the size of shares is derived for secret sharing schemes that protect against this type of attack and an optimum scheme is presented that meets the equality of this bound by using "difference sets".
References
More filters
Book

The Art of Computer Programming

TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

Polynomial Codes Over Certain Finite Fields

TL;DR: A mapping of m symbols into 2 symbols will be shown to be (2 m)/2 or ( 2 m 1)/2 symbol correcting, depending on whether m is even or odd.
Book

Algebraic Coding Theory

TL;DR: This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory," originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field.
Book

The theory of information and coding

TL;DR: In this paper, the authors present a survey of advanced topics for part I and a survey for part II of a survey on the Gaussian channel and the source coding theorem, including linear codes, BCH Goppa codes, and variable-length source coding.