R Kumar, S Rajagopalan, A Sahai - … , California, USA, August 15–19, 1999 …, 1999 - Springer
We consider the broadcast exclusion problem: how to transmit a message over a broadcast channel shared by N= 2 n users so that all but some specified coalition of k excluded users …
The security of many powerful cryptographic systems such as secure multiparty computation, threshold encryption, and threshold signatures rests on trust assumptions about the parties …
E Gafni, J Staddon, YL Yin - Annual International Cryptology Conference, 1999 - Springer
In many applications for content distribution, broadcast channels are used to transmit information from a distribution center to a large set of users. Broadcast encryption schemes …
A self-healing key distribution scheme enables dynamic groups of users of an unreliable network to establish group keys for secure communication. In such a scheme, a group …
A Beimel, H Othman - Security and Cryptography for Networks: 11th …, 2018 - Springer
Evolving secret-sharing schemes, introduced by Komargodski, Naor, and Yogev (TCC 2016b), are secret-sharing schemes in which the dealer does not know the number of …
KM Martin, R Safavi-Naini, H Wang - The Computer Journal, 1999 - ieeexplore.ieee.org
We consider the problem of redistributing shares in a secret sharing scheme in such a way that shareholders of a scheme with one access structure can transfer information to a new …
A Beimel, H Othman - Annual International Conference on the Theory and …, 2020 - Springer
Evolving secret-sharing schemes, introduced by Komargodski, Naor, and Yogev (TCC 2016b), are secret-sharing schemes in which there is no a-priory upper bound on the …
We prove that for every n and 1< t< n 1< t< n any t-out-of-n threshold secret sharing scheme for one-bit secrets requires share size\log (t+ 1) log (t+ 1). Our bound is tight when t= n-1 t= n …
S Garg¹, A Jain, P Mukherjee… - Advances in Cryptology …, 2023 - books.google.com
The security of many powerful cryptographic systems such as secure multiparty computation, threshold encryption, and threshold signatures rests on trust assumptions about the parties …