Secret sharing homomorphisms: keeping shares of a secret secret
Proceedings on Advances in cryptology---CRYPTO '86
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Fully Dynamic Secret Sharing Schemes
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Proceedings of the 5th IMA Conference on Cryptography and Coding
Threshold Schemes with Disenrollment
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Hi-index | 0.00 |
The change on membership of participants and its impact on the application of threshold cryptography are seldom considered in literature. However, it is a very important problem in secure dynamic cooperation in modern business environment. In this paper, a scalable threshold scheme is proposed as preliminary study on this field. Our proposal is to put together multiple simple Shamir's threshold schemes to realize a scalable one, without requiring any cryptographic assumption and a trusted third party.