A Study on Secret Sharing Schemes with Dishonest Dealers and Participants

@inproceedings{Tso2004ASO,
  title={A Study on Secret Sharing Schemes with Dishonest Dealers and Participants},
  author={Raylin Tso},
  year={2004}
}
For most cryptosystems, by using a single-system master key there is a need to protect many important encryption and decryption keys used to achieve data security. There are three major drawbacks under this single-master key arrangment. First, if the master key is disclosed to the public by accident, then the entire system has no secrecy at all. Second, if the master key is lost, then all the keys under protection become inaccessible. Third, if the owner of the master key becomes disloyal, then… CONTINUE READING
1 Citations
34 References
Similar Papers

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 34 references

Efficient sharing (broadcasting) of multiple secrets

  • L. Harn
  • IEE Proc. -Comput. Digit. Tech
  • 1995
Highly Influential
10 Excerpts

Benaloh, Secret sharing homomorphisms: Keeping shares of a secret secret

  • J C.
  • Lecture Notes in Comput. Sci
  • 1987
Highly Influential
3 Excerpts

Coding theory at work in cryptology and vice versa

  • H.C.A. van Tilborg
  • Handbook of Coding Theory, Volumn
  • 1998
1 Excerpt

Sarwate , On sharing secrets and Reed - Solomon codes

  • V. D.
  • Comm . ACM
  • 1995

Similar Papers

Loading similar papers…