How to avoid the cheaters succeeding in the key sharing scheme (Q1261009): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 2 users not shown)
Property / author
 
Property / author: Josep Rifà i Coma / rank
Normal rank
 
Property / reviewed by
 
Property / reviewed by: Jozef Vyskoč / rank
Normal rank
 
Property / author
 
Property / author: Josep Rifà i Coma / rank
 
Normal rank
Property / reviewed by
 
Property / reviewed by: Jozef Vyskoč / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Detection of Cheaters in Thershold Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4156696 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4146667 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret with cheaters / rank
 
Normal rank

Latest revision as of 18:45, 17 May 2024

scientific article
Language Label Description Also known as
English
How to avoid the cheaters succeeding in the key sharing scheme
scientific article

    Statements

    How to avoid the cheaters succeeding in the key sharing scheme (English)
    0 references
    0 references
    29 August 1993
    0 references
    The problem of secret sharing involves distributing a set of \(n\) shares \(D_ i\) in such a way that any \(k\) of them suffice to compute the secret \(D\) while less than \(k\) shares is not enough to do so. It may happen, however, that one or more participants in the scheme will try to cheat by providing false share instead of the true one, thus making the result of such collective computation different from the original secret \(D\). It may even happen that such cheater will be later able to recompute the original secret, while the other will be left with the wrong result only. In the article two secret sharing schemes intended to prevent cheating by one or more participants are proposed. One of the schemes proposed just prevents cheating without raising an alarm, the second one allows for detecting attempts to cheat. Both schemes are based on the use of rational interpolation.
    0 references
    0 references
    secret sharing
    0 references
    rational interpolation
    0 references
    0 references
    0 references