threshold cryptosystems
Recently Published Documents


TOTAL DOCUMENTS

24
(FIVE YEARS 3)

H-INDEX

10
(FIVE YEARS 1)

Author(s):  
Alin Tomescu ◽  
Robert Chen ◽  
Yiming Zheng ◽  
Ittai Abraham ◽  
Benny Pinkas ◽  
...  

Author(s):  
Dan Boneh ◽  
Rosario Gennaro ◽  
Steven Goldfeder ◽  
Aayush Jain ◽  
Sam Kim ◽  
...  

2017 ◽  
Vol 2017 ◽  
pp. 1-6 ◽  
Author(s):  
Lein Harn ◽  
Ching-Fang Hsu ◽  
Zhe Xia ◽  
Junwei Zhou

In a secret-sharing scheme, the secret is shared among a set of shareholders, and it can be reconstructed if a quorum of these shareholders work together by releasing their secret shares. However, in many applications, it is undesirable for nonshareholders to learn the secret. In these cases, pairwise secure channels are needed among shareholders to exchange the shares. In other words, a shared key needs to be established between every pair of shareholders. But employing an additional key establishment protocol may make the secret-sharing schemes significantly more complicated. To solve this problem, we introduce a new type of secret-sharing, calledprotected secret-sharing(PSS), in which the shares possessed by shareholders not only can be used to reconstruct the original secret but also can be used to establish the shared keys between every pair of shareholders. Therefore, in the secret reconstruction phase, the recovered secret is only available to shareholders but not to nonshareholders. In this paper, an information theoretically secure PSS scheme is proposed, its security properties are analyzed, and its computational complexity is evaluated. Moreover, our proposed PSS scheme also can be applied to threshold cryptosystems to prevent nonshareholders from learning the output of the protocols.


2016 ◽  
Vol 363 ◽  
pp. 140-153 ◽  
Author(s):  
Chenchen Zhang ◽  
Yuan Luo ◽  
Guangtao Xue

2013 ◽  
Vol 478 ◽  
pp. 76-100 ◽  
Author(s):  
Benoît Libert ◽  
Moti Yung

Sign in / Sign up

Export Citation Format

Share Document