scispace - formally typeset
Journal ArticleDOI

On sharing secrets and Reed-Solomon codes

Reads0
Chats0
TLDR
Decoding algorithms for Reed-Solomon codes provide extensions and generalizations of Shamir's method, which is closely related to Reed- Solomon coding schemes.
Abstract
Shamir's scheme for sharing secrets is closely related to Reed-Solomon coding schemes. Decoding algorithms for Reed-Solomon codes provide extensions and generalizations of Shamir's method.

read more

Citations
More filters
Proceedings ArticleDOI

Simplified VSS and fast-track multiparty computations with applications to threshold cryptography

TL;DR: A very simple Verifiable Secret Sharing protocol is presented which is based on fast cryptographic primitives and avoids altogether the need for expensive zero-knowledge proofs and a highly simplified protocol to compute multiplications over shared secrets.
Book ChapterDOI

Security of ramp schemes

TL;DR: A k out of n p/s/r process [AS81] is a very efficient way to convey information (k words suffice to reclaim k words), but it provides virtually no cryptographic security for the information it deals with.
Journal ArticleDOI

An explication of secret sharing schemes

TL;DR: This paper presents numerous direct constructions for secret sharing schemes, such as the Shamir threshold scheme, the Boolean circuit construction of Benaloh and Leichter, the vector space construction of Brickell, and the Simmons geometric construction, emphasizing combinatorial construction methods.
Book

Secure Multiparty Computation and Secret Sharing

TL;DR: This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing, focusing on asymptotic results with interesting applications related to MPC.
Journal ArticleDOI

Perfectly secure message transmission

TL;DR: These are the first algorithms for secure communication in a general network to simultaneously achieve the three goals of perfect secrecy, perfect resiliency, and worst-case time linear in the diameter of the network.
References
More filters
Book

The Art of Computer Programming

TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

Polynomial Codes Over Certain Finite Fields

TL;DR: A mapping of m symbols into 2 symbols will be shown to be (2 m)/2 or ( 2 m 1)/2 symbol correcting, depending on whether m is even or odd.
Book

Algebraic Coding Theory

TL;DR: This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory," originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field.
Book

The theory of information and coding

TL;DR: In this paper, the authors present a survey of advanced topics for part I and a survey for part II of a survey on the Gaussian channel and the source coding theorem, including linear codes, BCH Goppa codes, and variable-length source coding.