How to share a secret with cheaters
Journal of Cryptology
Verifiable secret sharing and multiparty protocols with honest majority
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
The detection of cheaters in threshold schemes
SIAM Journal on Discrete Mathematics
Some improved bounds on the information rate of perfect secret sharing schemes
Journal of Cryptology
An explication of secret sharing schemes
Designs, Codes and Cryptography
On sharing secrets and Reed-Solomon codes
Communications of the ACM
Communications of the ACM
Information Theory: Coding Theorems for Discrete Memoryless Systems
Information Theory: Coding Theorems for Discrete Memoryless Systems
On the Size of Shares for Secret Sharing Schemes
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On the Information Rate of Secret Sharing Schemes (Extended Abstract)
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Graph decompositions and secret sharing schemes
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Detection of Cheaters in Vector Space Secret Sharing Schemes
Designs, Codes and Cryptography
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
Designs, Codes and Cryptography
Cheating Immune Secret Sharing
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Constructions of Cheating Immune Secret Sharing
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Cheating Prevention in Secret Sharing over GF(pt)
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
FCT '99 Proceedings of the 12th International Symposium on Fundamentals of Computation Theory
Cheating Prevention in Linear Secret Sharing
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Properties and constraints of cheating-immune secret sharing schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Robust computational secret sharing and a unified account of classical secret-sharing goals
Proceedings of the 14th ACM conference on Computer and communications security
Detection and identification of cheaters in (t, n) secret sharing scheme
Designs, Codes and Cryptography
Properties and constraints of cheating-immune secret sharing schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Optimum secret sharing scheme secure against cheating
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Flaws in some secret sharing schemes against cheating
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Efficient (k, n) threshold secret sharing schemes secure against cheating from n - 1 cheaters
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Almost optimum t-cheater identifiable secret sharing schemes
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Almost optimum secret sharing schemes secure against cheating for arbitrary secret distribution
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Cheating immune (2, n)-threshold visual secret sharing
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
FAN: friendship based anonymous routing in wireless social mobile networks of malicious communities
Proceedings of the 3rd Extreme Conference on Communication: The Amazon Expedition
Hi-index | 0.00 |
In this paper we study the amount of secret information that must be given to participants in any secret sharing scheme that is secure against coalitions of dishonest participants in the model of Tompa and Woll [20]. We show that any (k, n) threshold secret sharing algorithm in which any coalition of less than k participants has probability of successful cheating less than some 驴 0 it must give to each participant shares whose sizes are at least the size of the secret plus log 1/驴.