Linear multi-secret sharing schemes based on multi-party computation (Q998657): Difference between revisions
From MaRDI portal
Changed an Item |
Set profile property. |
||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank |
Revision as of 01:51, 5 March 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Linear multi-secret sharing schemes based on multi-party computation |
scientific article |
Statements
Linear multi-secret sharing schemes based on multi-party computation (English)
0 references
9 February 2009
0 references
The authors present a variant of multi secret sharing protocol. The entire study has a step by step explanation, in the classical way: what is done, what is weak, what we improved. In this way, they show as a description of how to improve the security level, according with some assumptions. The mathematical background has a particular way of exposure and can be catalogized like good enough. There are three examples exposed in order to have a better understanding of the model.
0 references
secret sharing protocol
0 references