scispace - formally typeset
Journal ArticleDOI

On sharing secrets and Reed-Solomon codes

Reads0
Chats0
TLDR
Decoding algorithms for Reed-Solomon codes provide extensions and generalizations of Shamir's method, which is closely related to Reed- Solomon coding schemes.
Abstract
Shamir's scheme for sharing secrets is closely related to Reed-Solomon coding schemes. Decoding algorithms for Reed-Solomon codes provide extensions and generalizations of Shamir's method.

read more

Citations
More filters
Proceedings ArticleDOI

Distributed fingerprints and secure information dispersal

Hugo Krawczyk
TL;DR: The proposed solution is space optimal and flexible enough to replace the basic IDA algorithm in most applications that contemplate general faults, and introduces a new cryptographic tool called distributed fingerprints, which consists of public fingerprints for data integrity having the “paradoxical” property that everyone in the system can compute them but no one can forge them.
Book ChapterDOI

Perfectly Secure Message Transmission Revisited

TL;DR: In this paper, the necessary and sufficient conditions for achieving secure communications against active adversaries in mixed one-way and two-way channels were studied. But they only considered the case when all channels are two-ways or all channels were one-ways.

Some Applications of Coding Theory in Cryptography

J. L. Massey
TL;DR: The applicability of techniques in coding theory to problems in cryptography is illustrated by examples concerning secret-sharing schemes with tailored access priveleges, the design of perfect local randomizers, the construction of t-resilient functions, and the quantization of the nonlinearity of boolean functions.
Book ChapterDOI

A protocol to set up shared secret schemes without the assistance of mutually trusted party

TL;DR: All shared secret or shared control schemes devised thus far are autocratic in the sense that no one can be trusted to know the secret and hence it has appeared to be impossible to construct and distribute the private pieces of information needed to realize a shared control scheme.
Book ChapterDOI

A Realization Scheme for the Identity-Based Cryptosystem

TL;DR: A new realization scheme of the modified identity-based cryptosystem has been proposed, based on the discrete logarithm problem and the difficulty of factoring a large integer composed of two large primes.
References
More filters
Book

The Art of Computer Programming

TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

Polynomial Codes Over Certain Finite Fields

TL;DR: A mapping of m symbols into 2 symbols will be shown to be (2 m)/2 or ( 2 m 1)/2 symbol correcting, depending on whether m is even or odd.
Book

Algebraic Coding Theory

TL;DR: This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory," originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field.
Book

The theory of information and coding

TL;DR: In this paper, the authors present a survey of advanced topics for part I and a survey for part II of a survey on the Gaussian channel and the source coding theorem, including linear codes, BCH Goppa codes, and variable-length source coding.