Lower bounds for robust secret sharing schemes
Information Processing Letters
Communications of the ACM
Contemporary Cryptology: The Science of Information Integrity
Contemporary Cryptology: The Science of Information Integrity
Constructions and Bounds for Visual Cryptography
ICALP '96 Proceedings of the 23rd International Colloquium on Automata, Languages and Programming
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Modern Computational Intelligence Methods for the Interpretation of Medical Images
Modern Computational Intelligence Methods for the Interpretation of Medical Images
General short computational secret sharing schemes
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Universally ideal secret-sharing schemes
IEEE Transactions on Information Theory
Linguistic protocols for secure information management and sharing
Computers & Mathematics with Applications
Cognitive systems and bio-inspired computing in homeland security
Journal of Network and Computer Applications
Hi-index | 0.09 |
This publication discusses new opportunities for creating threshold schemes for secret sharing arising from the use of mathematical linguistic formalisms. Such methods are based on known threshold schemes of information splitting extended by adding an extra stage at which bit blocks of the shared information are coded using suitably defined context-free grammars. In practice, this will help with developing new algorithms, which besides allowing information sharing will also make it possible to obtain protocols for the confidential exchange of this information with or without involving a trusted instance. Such protocols will contribute to the development of modern cryptographic techniques and future computer science.