Secret sharing over infinite domains (Q1261017): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: reviewed by (P1447): Item:Q587571
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / reviewed by
 
Property / reviewed by: Jozef Vyskoč / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / cites work
 
Property / cites work: On hiding information from an oracle / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3778674 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4197800 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3671036 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3689094 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Theory of Secrecy Systems* / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Combinatorial Approach to Threshold Schemes / rank
 
Normal rank

Latest revision as of 17:45, 17 May 2024

scientific article
Language Label Description Also known as
English
Secret sharing over infinite domains
scientific article

    Statements

    Secret sharing over infinite domains (English)
    0 references
    0 references
    0 references
    29 August 1993
    0 references
    Various schemes for secret-sharing, i.e. distributing a secret among \(n\) parties in a way that allows ``legal'' sets of parties to reconstruct the secret while preventing ``illegal'' sets of parties to get information about the secret, are already known. However, these schemes were designed for cases where the set of secrets and the set of shares are finite. In the article the existence of secret-sharing schemes over infinite domains is studied. It is shown that infinity alone is not sufficient to decide the (im)possibility of secret-sharing schemes, as the cardinality of the domain must be taken into account as well. Particularly, if the sets of secrets and shares are countable then no secret-sharing scheme exists. This result contrasts with another one stating that if the sets of secrets and shares have the cardinality of the reals then perfect (i.e. no illegal set of shares reveals any partial information about the secret) secret-sharing schemes do exist. As a consequence it is shown that perfect private-key encryption (i.e. the one where an eavesdropper gets no partial information about the plaintext by examining the ciphertext) is not possible over a countable domain. On the other hand, over the reals a perfect private-key encryption scheme does exist.
    0 references
    secret-sharing
    0 references
    perfect private-key encryption
    0 references
    0 references

    Identifiers