Some new classes of geometric threshold schemes
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A combinatorial approach to threshold schemes
SIAM Journal on Discrete Mathematics
On sharing secrets and Reed-Solomon codes
Communications of the ACM
Communications of the ACM
On key distribution via true broadcasting
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Conditionally secure secret sharing schemes with disenrollment capability
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
New protocols for third-party-based authentication and secure broadcast
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Changing Thresholds in the Absence of Secure Channels
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Size of Broadcast in Threshold Schemes with Disenrollment
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Fully Dynamic Secret Sharing Schemes
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Secret Sharing with Public Reconstruction (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Threshold DSS Signatures without a Trusted Party
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Scalable threshold scheme without a trusted third party
ICCC '02 Proceedings of the 15th international conference on Computer communication
Combiner Driven Management Models and Their Applications
Research in Cryptology
Crypto topics and applications II
Algorithms and theory of computation handbook
SIAM Journal on Discrete Mathematics
Middleware for a re-configurable distributed archival store based on secret sharing
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
Threshold changeable secret sharing schemes revisited
Theoretical Computer Science
Research note: An on-line secret sharing scheme for multi-secrets
Computer Communications
Continual leakage-resilient dynamic secret sharing in the split-state model
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Hi-index | 0.00 |
When a shadow of a threshold scheme is publicized, new shadows have to be reconstructed and redistributed in order to maintain the same level of security. In this paper we consider threshold schemes with disenrollment capabilities where the new shadows can be created by broadcasts through a public channel. We establish a lower bound on the size of each shadow in a scheme that allows L disenrollments. We exhibit three systems that achieve the lower bound on shadow size.