On ASGS framework: general requirements and an example of implementation
From MaRDI portal
Publication:2644567
Abstract: In the paper we propose general framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying secret sharing scheme. ASGS allows to prevent the dealer from knowing the secret or even to eliminate him at all. Two situations are discussed. First concerns simultaneous generation and sharing of the random, prior nonexistent secret. Such a secret remains unknown until it is reconstructed. Next, we propose the framework for automatic sharing of a known secret. In this case the dealer does not know the secret and the secret owner does not know the shares. We present opportunities for joining ASGS with other extended capabilities, with special emphasize on PVSS and proactive secret sharing. Finally, we illustrate framework with practical implementation. Keywords: cryptography, secret sharing, data security, extended capabilities, extended key verification protocol
Recommendations
Cites work
- scientific article; zbMATH DE number 1731748 (Why is no real title available?)
- scientific article; zbMATH DE number 177618 (Why is no real title available?)
- scientific article; zbMATH DE number 4123667 (Why is no real title available?)
- scientific article; zbMATH DE number 1304079 (Why is no real title available?)
- scientific article; zbMATH DE number 1032022 (Why is no real title available?)
- scientific article; zbMATH DE number 1489998 (Why is no real title available?)
- scientific article; zbMATH DE number 203646 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 3303655 (Why is no real title available?)
- scientific article; zbMATH DE number 3197115 (Why is no real title available?)
- A modular approach to key safeguarding
- Anonymous secret sharing schemes
- How to share a secret
- On secret sharing systems
- On the dealer's randomness required in secret sharing schemes
- Publicly verifiable secret sharing
- Securing threshold cryptosystems against chosen ciphertext attack
This page was built for publication: On ASGS framework: general requirements and an example of implementation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2644567)