Mutually trusted authority-free secret sharing schemes
Date
1997
Authors
Jackson, W.A.
Martin, K.
O'Keefe, C.
Editors
Advisors
Journal Title
Journal ISSN
Volume Title
Type:
Journal article
Citation
Journal of Cryptology, 1997; 10(4):261-289
Statement of Responsibility
Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
Conference Name
Abstract
Traditional secret sharing schemes involve the use of a mutually trusted authority to assist in the generation and distribution of shares that will allow a secret to be protected among a set of participants. In contrast, this paper addresses the problem of establishing secret sharing schemes for a given access structure without the use of a mutually trusted authority. A general protocol is discussed and several implementations of this protocol are presented. Several efficiency measures are proposed and we consider how to refine the general protocol in order to improve the efficiency with respect to each of the proposed measures. Special attention is given to mutually trusted authority-free threshold schemes. Constructions are presented for such threshold schemes that are shown to be optimal with respect to each of the proposed efficiency measures.
School/Discipline
Dissertation Note
Provenance
Description
Access Status
Rights
© 1997, International Association for Criptologic Research