Mutually trusted authority-free secret sharing schemes

Date

1997

Authors

Jackson, W.A.
Martin, K.
O'Keefe, C.

Editors

Advisors

Journal Title

Journal ISSN

Volume Title

Type:

Journal article

Citation

Journal of Cryptology, 1997; 10(4):261-289

Statement of Responsibility

Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe

Conference Name

Abstract

Traditional secret sharing schemes involve the use of a mutually trusted authority to assist in the generation and distribution of shares that will allow a secret to be protected among a set of participants. In contrast, this paper addresses the problem of establishing secret sharing schemes for a given access structure without the use of a mutually trusted authority. A general protocol is discussed and several implementations of this protocol are presented. Several efficiency measures are proposed and we consider how to refine the general protocol in order to improve the efficiency with respect to each of the proposed measures. Special attention is given to mutually trusted authority-free threshold schemes. Constructions are presented for such threshold schemes that are shown to be optimal with respect to each of the proposed efficiency measures.

School/Discipline

Dissertation Note

Provenance

Description

Access Status

Rights

© 1997, International Association for Criptologic Research

License

Grant ID

Call number

Persistent link to this record