scispace - formally typeset
Journal ArticleDOI

On sharing secrets and Reed-Solomon codes

Reads0
Chats0
TLDR
Decoding algorithms for Reed-Solomon codes provide extensions and generalizations of Shamir's method, which is closely related to Reed- Solomon coding schemes.
Abstract
Shamir's scheme for sharing secrets is closely related to Reed-Solomon coding schemes. Decoding algorithms for Reed-Solomon codes provide extensions and generalizations of Shamir's method.

read more

Citations
More filters
Book ChapterDOI

On communication complexity of secure message transmission in directed networks

TL;DR: The lower bounds on communication complexity of two and three or more phase PSMT protocols in directed networks are derived and a communication optimal PRMT over a directed network that satisfies the conditions stated in the characterization is designed.
Journal ArticleDOI

Algorithm 994: Fast Implementations of the Brouwer-Zimmermann Algorithm for the Computation of the Minimum Distance of a Random Linear Code

TL;DR: This article presents and assess a family of implementations of both the brute-force algorithm and the Brouwer-Zimmermann algorithm for computing the minimum distance of a random linear code over F2 that are faster than current implementations, both in the commercial and public domain.
Book ChapterDOI

Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model

TL;DR: The main results of this paper are a non-interactive VSS where the amount of data which needs to be predistributed to each player depends on the number of tolerable cheaters only, a simplified multiplication protocol for shared values based on Predistributed random products, a protocol for fair exchange of secrets based onpredistributed data, and non-Interactive zero knowledge proofs for arbitrary polynomial relations.
Journal ArticleDOI

Quantum strongly secure ramp secret sharing

TL;DR: This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes, and ensures that qudits with critical information can no longer be leaked.
Book

RFID Security and Privacy

TL;DR: A systematic overview on RFID security and privacy is provided at both the physical and network level, which means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFIDs should be identify without disclosure of any valuable information about the devices.
References
More filters
Book

The Art of Computer Programming

TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

Polynomial Codes Over Certain Finite Fields

TL;DR: A mapping of m symbols into 2 symbols will be shown to be (2 m)/2 or ( 2 m 1)/2 symbol correcting, depending on whether m is even or odd.
Book

Algebraic Coding Theory

TL;DR: This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory," originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field.
Book

The theory of information and coding

TL;DR: In this paper, the authors present a survey of advanced topics for part I and a survey for part II of a survey on the Gaussian channel and the source coding theorem, including linear codes, BCH Goppa codes, and variable-length source coding.