Nearly optimal robust secret sharing

We prove that a known general approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an information-theoretic authentication tag to the secret, can make it robust for n parties against any collusion of size δ n , for any constant δ ∈ ( 0 , 1 / 2 ) . Shamir’s original scheme is r...

Full description

Saved in:
Bibliographic Details
Published in:Designs, codes, and cryptography Vol. 87; no. 8; pp. 1777 - 1796
Main Author: Cheraghchi, Mahdi
Format: Journal Article
Language:English
Published: New York Springer US 15.08.2019
Springer Nature B.V
Subjects:
ISSN:0925-1022, 1573-7586
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first