Fact-checked by Grok 2 weeks ago
References
-
[1]
[PDF] How to Share a Secret - MITHow to Share a Secret. Adi Shamir. Massachusetts Institute of Technology. In this paper we show how to divide data D into n pieces in such a way that D is ...
-
[2]
Secret sharing: A comprehensive survey, taxonomy and applicationsSecret sharing is a method that allows a trusted authority (the dealer) to distribute a secret or a number of secrets among some target participants.
-
[3]
(PDF) OVERVIEW OF BLAKLEYS SECRET SHARING SCHEMEJan 8, 2019 · A secret image sharing method based on Blakley's geometric approach is proposed in this article. The method can reconstruct secret images by ...<|control11|><|separator|>
-
[4]
How to share a secret | Communications of the ACMNov 1, 1979 · How to share a secret. Author: Adi Shamir. Adi Shamir. Massachusetts ... PDFeReader. Contents. Communications of the ACM. Volume 22, Issue 11 ...
-
[5]
[PDF] Safeguarding cryptographic keys - Semantic ScholarSafeguarding cryptographic keys · G. Blakley · Published in International Workshop on… 30 December 1899 · Computer Science · 1979 International Workshop on Managing ...
-
[6]
[PDF] Summary of Lecture on Secret Sharing 1 Motivation and DefinitionAdditionally, secret sharing is a useful tool in many larger cryptographic systems (notably, secure computation).
-
[7]
[PDF] On the Size of Shares for Secret Sharing SchemesSecret Sharing is an important tool in Security and Cryptography. In many cases there is a single master key that provides the access to important secret ...Missing: motivations | Show results with:motivations
-
[8]
[PDF] A Review of Secret Sharing Schemes - SciSpaceSecret Sharing was proposed with the motivation of protecting and securing secret key in cryptography. Shamir (1979) formed the foundation for secret ...
-
[9]
Multi-Party Threshold Cryptography | CSRCUsing a “secret sharing” mechanism, the secret key is split across multiple "parties". Then, if some (up to a threshold f out of n) of these parties are ...
-
[10]
(PDF) Secret-Sharing Schemes: A Survey - ResearchGateAug 7, 2025 · A secret-sharing scheme is a method by which a dealer distributes shares to parties such that only authorized subsets of parties can reconstruct the secret.
-
[11]
[PDF] Secret sharing made short - Cornell: Computer ScienceIt just combines in a natural way traditional secret sharing schemes, with encryption and information dispersal techniques. Our scheme is simple, practical and ...
-
[12]
CS 513 System Security -- Secret SharingImagine that you are asked to design a control mechanism for a nuclear missile launch. There is a control panel with a key board. You can enter a secret code ...
-
[13]
Dead Man's Switch vs. Secret Sharing SystemsAug 24, 2025 · What are common use cases for Secret Sharing? Cryptocurrency wallets, corporate decision-making, and digital inheritance. 10. Which system is ...
-
[14]
Threshold Cryptography: An Overview - Panther ProtocolOct 6, 2022 · Threshold cryptosystems protect information by encrypting and distributing secrets amongst a cluster of independent computers that qualify as fault-tolerant.What is threshold cryptography? · Applications of threshold... · Mitigating MEV
-
[15]
[PDF] INTERNATIONAL STANDARD ISO/IEC 11889-1Dec 15, 2015 · 9.3 Trusted Platform Module ... A.9 Secret Sharing ...
-
[16]
Lattice-Based Threshold Secret Sharing Scheme and Its ApplicationsJan 8, 2024 · The threshold secret sharing (TSS) scheme is an important field of cryptography and has important application value and development prospects in ...2. Lattice-Based... · 4.2. Lattice-Based Vss · 5.3. Lattice-Based...
-
[17]
Comparing Security Notions of Secret Sharing Schemes - MDPIEntropies, such as Shannon entropy and min entropy, are frequently used in the setting security notions for secret sharing schemes.
-
[18]
None### Summary of arXiv:2502.02774 on Secret Sharing
-
[19]
Adversary Models for Secret Sharing SchemesPassive vs active. This is the most basic categorization of adversaries on a protocol level. A passive adversary is only allowed to corrupt a party in the sense ...
- [20]
-
[21]
Secret sharing scheme realizing general access structure - Ito - 1989This paper shows that by providing the trustees with several information data concerning the distributed information of the (k, n) threshold method, any access ...
- [22]
-
[23]
[PDF] Secret-Sharing Schemes for General and Uniform Access StructuresFor over 30 years, it was known that any (monotone) collection of authorized sets can be realized by a secret-sharing scheme whose shares are of size 2n−o(n) ...
-
[24]
[PDF] Lecture Notes on Secret Sharing 1 DefinitionWe note that additive secret sharing can easily be extended to any t-out-of-t threshold secret sharing. The sharing algorithm chooses t strings uniformly at.
-
[25]
Safeguarding cryptographic keys | IEEE Conference PublicationThe paper on safeguarding cryptographic keys covers operating systems, data security, multiprocessing, software engineering, and computer networks.
-
[26]
[PDF] Vector space multisecret-sharing scheme based on Blakley's methodFeb 10, 2023 · Section IV collects concluding remarks. Blakley's secret sharing scheme uses hyperplane geometry to solve the secret sharing problem. The ...Missing: explanation | Show results with:explanation
-
[27]
Proactive Secret Sharing Or:Abstract. Secret sharing schemes protect secrets by distributing them over different locations (share holders). In particular, in k out of R threshold.
-
[28]
[PDF] Strategies of Proactive (k, n) Threshold Secret Sharing and ...Abstract. A secret sharing scheme protects the secret by distributing it to a group of participants (nodes), and it allows for some groups of participants ...
-
[29]
A practical scheme for non-interactive verifiable secret sharingPublished: 12 October 1987 Publication History. 222 ... This paper presents an extremely efficient, non-interactive protocol for verifiable secret sharing.
-
[30]
Non-Interactive and Information-Theoretic Secure Verifiable Secret ...May 18, 2001 · It is shown how to distribute a secret to n persons such that each person can verify that he has received correct information about the secret without talking ...
-
[31]
Verifiable Secret Sharing for General Access Structures, with ...In this work, we generalize some protocols dealing with verifiable secret sharing, in such a way that they run in a general distributed scenario for both the ...
-
[32]
Secret Sharing Made Short | SpringerLinkKrawczyk, H., “Distributed Fingerprints and Secure Information ... About this paper. Cite this paper. Krawczyk, H. (1994). Secret Sharing Made Short.Missing: summary | Show results with:summary
-
[33]
How to sign digital streamsNo readable text found in the HTML.<|separator|>
-
[34]
[PDF] Space Efficient Computational Multi-Secret Sharing and Its ...Shamir. How to share a secret. Communications of the ACM, 22(22):612–613,. 1979. 26. C. Tartary, J. Pieprzyk, and H. Wang. Verifiable multi-secret sharing ...
-
[35]
[PDF] (t, n) Multi-Secret Sharing Scheme Based on Bivariate PolynomialShares generated using a bivariate polynomial can not only be used to reconstruct multiple secrets but also be used to establish pairwise keys between any pair ...Missing: multivariate | Show results with:multivariate
-
[36]
[PDF] CRT Based Threshold Multi Secret Sharing SchemeThis paper presents a novel secret sharing system that is based on Chinese remainder theorem. This scheme deals with a concept of multiple secrets to be ...
-
[37]
[PDF] New Results and Applications for Multi-Secret Sharing SchemesA trivial way of implementing multi-policy distributed cryptosystems is by running ` independent instances of a standard distributed cryptosystem, one for each ...<|control11|><|separator|>
-
[38]
Security of Ramp Schemes - SpringerLinkNov 24, 2000 · Blakley, G.R., Meadows, C. (1985). Security of Ramp Schemes. In: Blakley, G.R., Chaum, D. (eds) Advances in Cryptology. CRYPTO 1984. Lecture ...
-
[39]
[PDF] Improved Bounds on the Threshold Gap in Ramp Secret SharingIn this paper we consider linear secret sharing schemes over a finite field Fq, where the secret is a vector in F` q and each of the n shares is a single ...Missing: seminal | Show results with:seminal
-
[40]
[PDF] Secure Computation from Random Error Correcting CodesTrading corruption tolerance for small fields was first used in [6] where a class of algebraic geometric secret sharing schemes was introduced that are ideal, ...Missing: explanation | Show results with:explanation
-
[41]
[0901.4798] Space Efficient Secret Sharing - arXivJan 29, 2009 · Abstract: This note proposes a method of space efficient secret sharing in which k secrets are mapped into n shares (n>=k) of the same size.
-
[42]
[PDF] GMW87.pdfWe present a polynomial-time algorithm that, given as a input the description of a game with incomplete information and any number of players, produces a ...
-
[43]
[PDF] Foundations of secure interactive computing - AMiner[9] R. Blakley. "Security Proofs for Information Protection Systems." Proceedings of the. 1980 Symposium on Security and Privacy, IEEE Computer Society Press, ...
-
[44]
[PDF] A Practical Scheme for Non-interactive Verifiable Secret SharingAbJtract: This paper presents an extremely efficient, non-interactive protocol for verifiable secret sharing. Verifiable secret sharing (VSS) is a way of ...
-
[45]
[PDF] Threshold Signatures, Multisignatures and Blind Signatures Based ...In threshold signature schemes the secret key is distributed among n parties with the help of a trusted dealer or without it by running an interactive protocol ...
-
[46]
Frost - Zcash FoundationFROST is built upon the threshold Shamir secret sharing and Feldman verifiable secret sharing schemes and it relies only on the discrete logarithm assumption.
-
[47]
[PDF] MP-SPDZ: A Versatile Framework for Multi-Party ComputationMP-. SPDZ aims to lower the entry barrier to secure computation by providing standalone Linux binaries for every release and extensive documentation for the ...
-
[48]
About the security domain in Azure Key Vault Managed HSMApr 14, 2025 · The managed HSM initializes the security domain and encrypts it with the public keys that you provide by using Shamir's Secret Sharing Algorithm ...Security Domain Protection... · Storing The Security Domain... · Establishing A Security...
-
[49]
How HSM support changes Vault behavioral - HashiCorp DeveloperVault usually generates a root key and splits it using Shamir's Secret Sharing to prevent a single operator from being able to modify and unseal Vault (see more ...Missing: hardware | Show results with:hardware<|separator|>
-
[50]
[PDF] Publicly Verifiable Secret Sharing for Cloud-based Key ManagementOct 12, 2011 · Our work relies heavily on the techniques of secret-sharing schemes, in particular the standard exten- sion of Blakley-Shamir secret-sharing ...
-
[51]
[PDF] SAFE: A Secure and Efficient Long-Term Distributed Storage SystemSecret sharing-based distributed storage systems are one approach to provide long-term protection of data even against quantum com- puting. Confidentiality ...
-
[52]
Distributed Storage Meets Secret Sharing on the BlockchainWe use a novel combination of distributed storage, private key encryption, and Shamirs secret sharing scheme to distribute transaction data, without significant ...
-
[53]
Secure Secret Sharing With Adaptive Bandwidth in Distributed ...Jun 9, 2020 · To solve related problems, the distributed storage schemes have been proposed. Considering security and fault tolerance, many of those schemes ...
-
[54]
Secret sharing scheme in defense and big data analytics - IEEE XploreSecret information sharing plays one of the major factors to win wars, military operations, etc. But, it is hard to find methods of general topology or ...
-
[55]
[PDF] Communication-Optimal Proactive Secret Sharing for Dynamic GroupsSuch a restraint is particularly challenging in the case of long-term storage or computation, which was one of the reasons that the proactive security model was ...
-
[56]
[PDF] Proactive Secret Sharing in Dynamic EnvironmentsMay 17, 2019 · It was adapted for secret sharing by Herzberg et al, whose techniques continue to be used in subsequent works,. e.g. [16, 21, 9, 25, 34, 4, 28], ...