Secret-sharing schemes: A survey

A Beimel - International conference on coding and cryptology, 2011 - Springer
A secret-sharing scheme is a method by which a dealer distributes shares to parties such
that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes …

[LIBRO][B] Information theory and network coding

RW Yeung - 2008 - books.google.com
This book is an evolution from my book A First Course in Information Theory published in
2002 when network coding was still at its infancy. The last few years have witnessed the …

[LIBRO][B] A first course in information theory

RW Yeung - 2012 - books.google.com
A First Course in Information Theory is an up-to-date introduction to information theory. In
addition to the classical topics discussed, it provides the first comprehensive treatment of the …

The size of a share must be large

L Csirmaz - Journal of cryptology, 1997 - Springer
A secret sharing scheme permits a secret to be shared among participants of an n-element
group in such a way that only qualified subsets of participants can recover the secret. If any …

Intelligent data management and security in cloud computing

L Ogiela, MR Ogiela, H Ko - Sensors, 2020 - mdpi.com
This paper will present the authors' own techniques of secret data management and
protection, with particular attention paid to techniques securing data services. Among the …

Compiling for EDGE architectures

A Smith, J Burrill, J Gibson, B Maher… - … Symposium on Code …, 2006 - ieeexplore.ieee.org
Explicit data graph execution (EDGE) architectures offer the possibility of high instruction-
level parallelism with energy efficiency. In EDGE architectures, the compiler breaks a …

Perfect secret sharing schemes on five participants

WA Jackson, KM Martin - Designs, codes and cryptography, 1996 - Springer
A perfect secret sharing scheme is a system for the protection of a secret among a number of
participants in such a way that only certain subsets of these participants can reconstruct the …

Tight bounds on the information rate of secret sharing schemes

C Blundo, AD Santis, RD Simone… - Designs, Codes and …, 1997 - Springer
A secret sharing scheme is a protocol by means of which a dealer distributes a secret s
among a set of participants P in such a way that only qualified subsets of P can reconstruct …

On the cryptographic complexity of the worst functions

A Beimel, Y Ishai, R Kumaresan… - Theory of Cryptography …, 2014 - Springer
We study the complexity of realizing the “worst” functions in several standard models of
information-theoretic cryptography. In particular, for the case of security against passive …

Succinct computational secret sharing

B Applebaum, A Beimel, Y Ishai, E Kushilevitz… - Proceedings of the 55th …, 2023 - dl.acm.org
A secret-sharing scheme enables a dealer to share a secret s among n parties such that
only authorized subsets of parties, specified by a monotone access structure f:{0, 1} n→{0 …