A protocol to set up shared secret schemes without the assistance of mutually trusted party
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Some improved bounds on the information rate of perfect secret sharing schemes
Journal of Cryptology
An explication of secret sharing schemes
Designs, Codes and Cryptography
The consequences of trust in shared secret schemes
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Communications of the ACM
Information Theory and Reliable Communication
Information Theory and Reliable Communication
Generalized Secret Sharing and Monotone Functions
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
A General Decomposition Construction for Incomplete SecretSharing Schemes
Designs, Codes and Cryptography
Jointly Verifying Ownership of an Image Using Digital Watermarking
Multimedia Tools and Applications
An improved watermarking technique for multi-user, multi-right environments
Multimedia Tools and Applications
Sharing a quantum secret without a trusted party
Quantum Information Processing
Hi-index | 0.00 |
Traditional secret sharing schemes involve the use of a mutually trusted authority to assist in the generation and distribution of shares that will allow a secret to be protected among a set of participants. In contrast, this paper addresses the problem of establishing a secret sharing scheme for a given access structure without the use of a mutually trusted authority. A general protocol is discussed and several implementmations of this protocol are presented. The efficiency of these implementations is considered. The protocol is then refined and constructions are presented for mutually trusted authority free threshold schemes.