Nearly optimal robust secret sharing
We prove that a known general approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an information-theoretic authentication tag to the secret, can make it robust for n parties against any collusion of size δ n , for any constant δ ∈ ( 0 , 1 / 2 ) . Shamir’s original scheme is r...
Saved in:
| Published in: | Designs, codes, and cryptography Vol. 87; no. 8; pp. 1777 - 1796 |
|---|---|
| Main Author: | |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
Springer US
15.08.2019
Springer Nature B.V |
| Subjects: | |
| ISSN: | 0925-1022, 1573-7586 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!