Generalized secret sharing and monotone functions
CRYPTO '88 Proceedings on Advances in cryptology
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Hi-index | 0.00 |
It is shown that Perfect Secret Sharing Schemes are Simple Weak Effectivity Functions. Namely, for any finite set K of keys and any finite set N of participants the set of all Perfect Secret Sharing Schemes having 0-normalized security level #K -- 1 is characterized as the set of all Simple Weak Effectivity Functions on (N, K): perfection in secret sharing turns out to have simplicity as its nice game-theoretic counterpart. It also follows that Perfect Secret Sharing Schemes do admit universal implementation procedures using 1-threshold schemes as elementary 'building blocks'. JEL Classification Numbers 025,026