Shamir's Secret Sharing

Shamir's Secret Sharing is an algorithm in cryptography created by Adi Shamir. It is a form of secret sharing, where a secret is divided into parts… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Transmitting information in a secure way is now both a challenge in everyday life and a beautiful area for research. The type of… (More)
  • figure 1
  • figure 4
  • figure 3
  • figure 5
  • figure 8
Is this relevant?
2016
2016
Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. The security of the… (More)
  • figure 1
  • table I
  • table II
  • figure 2
  • figure 3
Is this relevant?
2015
2015
A secret sharing scheme is a method of distributing a secret among a set of participants in a such way such that certain subset… (More)
Is this relevant?
2014
2014
Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. But this scheme is vulnerable… (More)
  • figure 1
  • table I
  • table II
  • table III
Is this relevant?
2012
2012
At CHES 2011 Goubin and Martinelli described a new countermeasure against side-channel analysis for AES based on Shamir’s secret… (More)
  • figure 1
  • figure 2
Is this relevant?
2011
2011
Cryptographic algorithms embedded on physical devices are particularly vulnerable to Side Channel Analysis (SCA). The most common… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
  • table 4
Is this relevant?
2011
2011
Consider n participants P1, P2, . . . , Pn who want to distribute a secret s amongst themselves such that each participant Pi has… (More)
Is this relevant?
2006
2006
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without… (More)
  • table 1
  • table 2
Is this relevant?
2004
2004
A secret sharing scheme is a system designed to share a piece of information or the secret among a group of people such that only… (More)
Is this relevant?
2004
2004
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution… (More)
Is this relevant?