Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/39579
DC FieldValue
dc.titleScalable threshold closure
dc.contributor.authorZhang, C.
dc.contributor.authorLam, K.-Y.
dc.contributor.authorJajodia, S.
dc.date.accessioned2013-07-04T07:44:48Z
dc.date.available2013-07-04T07:44:48Z
dc.date.issued1999
dc.identifier.citationZhang, C.,Lam, K.-Y.,Jajodia, S. (1999). Scalable threshold closure. Theoretical Computer Science 226 (1-2) : 185-206. ScholarBank@NUS Repository.
dc.identifier.issn03043975
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/39579
dc.description.abstractSecret sharing is an important concept for implementing robust and secure computer systems. A (t, ℓ)-threshold scheme such as Shamir's (Commun. ACM22(11) (1979) 612-613) is a mechanism that allows a set of ℓ participants to share a secret such that only subsets of t or more participants can reconstruct it. The threshold scheme, though simple and easy to implement, is not flexible enough to support complex secret sharing policies typical in practical systems. An access structure (Benaloh and Leichter, Advances in Cryptology - CRYPTO'88, Lecture Notes in Computer Science, vol. 403, Springer, Berlin, 1990, pp. 27-35; Ito et al., Globecom'87, Tokyo, Japan, 1987, pp. 99-102), on the other hand, is a powerful concept by which complex secret sharing schemes may be represented. However, the implementation is very complicated when the access structure contains a great number of authorized sets. This paper introduces a new construction for the secret sharing schemes called threshold closure, which allows a complex access structure it represents to be realized by possibly the fewest number of (t, ℓ)-threshold schemes. © 1999 Elsevier Science B.V. All rights reserved.
dc.sourceScopus
dc.subjectAccess structure
dc.subjectScalability
dc.subjectSecret sharing scheme
dc.subjectThe Shamir threshold scheme
dc.subjectThreshold closure
dc.typeArticle
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.sourcetitleTheoretical Computer Science
dc.description.volume226
dc.description.issue1-2
dc.description.page185-206
dc.description.codenTCSCD
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.