threshold schemes
Recently Published Documents


TOTAL DOCUMENTS

81
(FIVE YEARS 12)

H-INDEX

14
(FIVE YEARS 1)

Author(s):  
Peter Ligeti ◽  
Peter Sziklai ◽  
Marcella Takáts

AbstractIn the history of secret sharing schemes many constructions are based on geometric objects. In this paper we investigate generalizations of threshold schemes and related finite geometric structures. In particular, we analyse compartmented and hierarchical schemes, and deduce some more general results, especially bounds for special arcs and novel constructions for conjunctive 2-level and 3-level hierarchical schemes.


2020 ◽  
Vol 15 (1) ◽  
pp. 179-196
Author(s):  
Maura B. Paterson ◽  
Douglas R. Stinson

AbstractIn this paper, we show a “direct” equivalence between certain authentication codes and robust threshold schemes. It was previously known that authentication codes and robust threshold schemes are closely related to similar types of designs, but direct equivalences had not been considered in the literature. Our new equivalences motivate the consideration of a certain “key-substitution attack.” We study this attack and analyze it in the setting of “dual authentication codes.” We also show how this viewpoint provides a nice way to prove properties and generalizations of some known constructions.


2020 ◽  
Vol 20 (11&12) ◽  
pp. 957-968
Author(s):  
Sarbani Roy ◽  
Sourav Mukhopadhyay

Quantum secret sharing (QSS) is an important branch of secure multiparty quantum computation. Several schemes for (n, n) threshold QSS based on quantum Fourier transformation (QFT) have been proposed. Inspired by the flexibility of (t, n) threshold schemes, Song {\it et al.} (Scientific Reports, 2017) have proposed a (t, n) threshold QSS utilizing QFT. Later, Kao and Hwang (arXiv:1803.00216) have identified a {loophole} in the scheme but have not suggested any remedy. In this present study, we have proposed a (t, n)threshold QSS scheme to share a d dimensional classical secret. This scheme can be implemented using local operations (such as QFT, generalized Pauli operators and local measurement) and classical communication. Security of the proposed scheme is described against outsider and participants' eavesdropping.


2020 ◽  
Author(s):  
Luis T A N Brandao ◽  
Michael Davidson ◽  
Apostol Vassilev

2020 ◽  
Vol 10 (7) ◽  
pp. 2411
Author(s):  
Yijun Wang ◽  
Bing Jia ◽  
Yun Mao ◽  
Xuelin Wu ◽  
Ying Guo

Quantum secret sharing (QSS) can usually realize unconditional security with entanglement of quantum systems. While the usual security proof has been established in theoretics, how to defend against the tolerable channel loss in practices is still a challenge. The traditional ( t , n ) threshold schemes are equipped in situation where all participants have equal ability to handle the secret. Here we propose an improved ( t , n ) threshold continuous variable (CV) QSS scheme using weak coherent states transmitting in a chaining channel. In this scheme, one participant prepares for a Gaussian-modulated coherent state (GMCS) transmitted to other participants subsequently. The remaining participants insert independent GMCS prepared locally into the circulating optical modes. The dealer measures the phase and the amplitude quadratures by using double homodyne detectors, and distributes the secret to all participants respectively. Special t out of n participants could recover the original secret using the Lagrange interpolation and their encoded random numbers. Security analysis shows that it could satisfy the secret sharing constraint which requires the legal participants to recover message in a large group. This scheme is more robust against background noise due to the employment of double homodyne detection, which relies on standard apparatuses, such as amplitude and phase modulators, in favor of its potential practical implementations.


2019 ◽  
Author(s):  
Luís T. A. N. Brandão ◽  
Michael Davidson ◽  
Apostol Vassilev

2019 ◽  
Author(s):  
Luís T.A.N. Brandão ◽  
Nicky Mouha ◽  
Apostol Vassilev

Sign in / Sign up

Export Citation Format

Share Document