Journal ArticleDOI
On sharing secrets and Reed-Solomon codes
Reads0
Chats0
TLDR
Decoding algorithms for Reed-Solomon codes provide extensions and generalizations of Shamir's method, which is closely related to Reed- Solomon coding schemes.Abstract:
Shamir's scheme for sharing secrets is closely related to Reed-Solomon coding schemes. Decoding algorithms for Reed-Solomon codes provide extensions and generalizations of Shamir's method.read more
Citations
More filters
Dissertation
Concevoir des applications temps-réel respectant la vie privée en exploitant les liens entre codes à effacements et les mécanismes de partages de secrets
TL;DR: In this paper, the authors propose a layered secret sharing scheme for partage en temps reel of donnees sur des reseaux sociaux (OSNs pour Online Social Network).
Decomposition construction for secret sharing schemes with graph access structures in
TL;DR: In this paper, a new decomposition construction for per-fect secret sharing schemes with graph access structures was proposed, where the linear programming problem involved in the construction is formulated in such a way that the number of "small" schemes is polynomial in the size of the participants, which in turn gives rise to a polynomially time construction.
Posted Content
RandSolomon: optimally resilient multi-party random number generation protocol.
Luciano Freitas de Souza,Sara Tucci Piergiovanni,Renaud Sirdey,Oana Stan,Nicolas Quero,Petr Kuznetsov +5 more
TL;DR: The RandSolomon protocol as mentioned in this paper allows a network of N processes to produce an unpredictable common random number among the non-faulty of them, and provides optimal resilience for partially-synchronous systems where less than a third of the participants might behave arbitrarily.
Proceedings ArticleDOI
On Secret Sharing Schemes from Nonlinear Codes
TL;DR: In this article , the authors determine the access structure of several nonlinear codes and examine its performance against Tompa-Woll attack, which is obtained from it's formally dual code.
Proceedings ArticleDOI
Quantifying the Cost of Privately Storing Data in Distributed Storage Systems
TL;DR: In this paper , the authors consider a user who wishes to store a file in multiple servers such that at least t servers are needed to reconstruct the files, and z colluding servers cannot learn any information about the file.
References
More filters
Book
The Art of Computer Programming
TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI
Polynomial Codes Over Certain Finite Fields
I. S. Reed,G. Solomon +1 more
TL;DR: A mapping of m symbols into 2 symbols will be shown to be (2 m)/2 or ( 2 m 1)/2 symbol correcting, depending on whether m is even or odd.
Book
Algebraic Coding Theory
TL;DR: This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory," originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field.
Book
The theory of information and coding
TL;DR: In this paper, the authors present a survey of advanced topics for part I and a survey for part II of a survey on the Gaussian channel and the source coding theorem, including linear codes, BCH Goppa codes, and variable-length source coding.