Secret sharing

Known as: Key splitting, Threshold scheme, Threshold shadow scheme 
Secret sharing (also called secret splitting) refers to methods for distributing a secret amongst a group of participants, each of whom is allocated… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
We introduce a new primitive called intrusion-resilient secret sharing (IRSS), whose security proof exploits the fact that there… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Visual secret sharing (VSS) scheme is a perfect secure method that protects a secret image by breaking it into shadow images… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Mark Hillery, Vladimı́r Bužek, and AndréBerthiaume Department of Physics and Astronomy, Hunter College, City University of New… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
The use of a linear code to "split" secrets into equal-size shares is considered. The determination of which sets of shares can… (More)
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Secret sharing schemes protect secrets by distributing them over diierent locations (share holders). In particular, in k out of n… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
The purpose of this paper is to decribe a very powerful decomposition construction for perfect secret sharing schemes. We give… (More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
A well-known fact in the theory of secret sharing schemes is that shares must be of length at least as the secret itself. However… (More)
Is this relevant?
Highly Cited
1992
Highly Cited
1992
This paper is an explication of secret sharing schemes, emphasizing combinatorial construction methods. The main problem we… (More)
  • figure 1
Is this relevant?
Highly Cited
1988
Highly Cited
1988
Secret Sharing from the perspective of threshold schemes has been wellstudied over the past decade. Threshold schemes, however… (More)
Is this relevant?
Highly Cited
1983
Highly Cited
1983
A “secret sharing system” permits a secret to be shared among n trustees in such a way that any k of them can recover the secret… (More)
Is this relevant?