Skip to search formSkip to main contentSkip to account menu

Secret sharing

Known as: Key splitting, Threshold scheme, Threshold shadow scheme 
Secret sharing (also called secret splitting) refers to methods for distributing a secret amongst a group of participants, each of whom is allocated… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Wireless sensor networks consist of many small nodes with distributing devices to monitor conditions at different locations… 
2009
2009
Location-based security service provides authorization of persons or facilities based on their distinctive location information… 
2007
2007
In a (t, n) threshold secret sharing scheme, any t- out-of-n participants could recover the shared secret, and any less than t… 
Highly Cited
2004
Highly Cited
2004
In this letter, we propose a color image segmentation algorithm based on contrast information. Given a color image, we use… 
2004
2004
We propose a secret sharing scheme with the property of access structures in a hierarchy. We employ the concept of admission… 
2000
2000
Organizations have long had the need to record and protect the knowledge that is their intellectual capital. However, the primary… 
1998
1998
This paper describes a learning algorithm for small autonomous mobile robots based on sets of fuzzy automata. The task of the… 
1998
1998
Secret sharing schemes are one of the most important primitives in distributed systems. In perfect secret sharing schemes… 
1983
1983
All through this paper the notion of secret that we will discuss is a notion linked to the use of a digital quantity called “key… 
1978
1978
A group random-access (GILA) control discipline for a multi-access communication channel is presented and studied. A GILA scheme…