How to share a secret with cheaters
Journal of Cryptology
Prepositioned shared secret and/or shared control schemes
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
An explication of secret sharing schemes
Designs, Codes and Cryptography
Fully dynamic secret sharing schemes
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Communications of the ACM
How to (Really) Share a Secret
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Proceedings of the 5th IMA Conference on Cryptography and Coding
Threshold Schemes with Disenrollment
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Updating the parameters of a threshold scheme by minimal broadcast
IEEE Transactions on Information Theory
Hi-index | 0.00 |
In this paper, we will study the question of performing arbitrary updates in secret sharing schemes when shares of unaffected parties shall remain unchanged. We will introduce a new phase in the lifetime of secret sharing schemes to simplify constructions of multi-time secret sharing schemes and propose management models that allow unlimited updates from arbitrary schemes without need for broadcasts. As an example, we give an implementation based on Shamir's threshold scheme.