Veto is impossible in secret sharing schemes

被引:0
|
作者
Obana, S [1 ]
Kurosawa, K [1 ]
机构
[1] TOKYO INST TECHNOL,MEGURO KU,TOKYO 152,JAPAN
关键词
safety/security in digital systems; secret sharing;
D O I
10.1016/0020-0190(96)00052-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Beutelspacher considered a secret sharing scheme having a veto capability such that qualified minorities can prevent any other set of participants from reconstructing the secret. In this paper, we prove that there exist no such schemes if we do not assume that the reconstruction machine is trustworthy.
引用
收藏
页码:293 / 295
页数:3
相关论文
共 50 条
  • [41] Secret sharing schemes based on the dual of Golay codes
    Ding, Jian
    Lin, Changlu
    Mesnager, Sihem
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (06): : 1025 - 1041
  • [42] Leakage Resilient Cheating Detectable Secret Sharing Schemes
    Dutta, Sabyasachi
    Safavi-Naini, Reihaneh
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 3 - 23
  • [43] Tight Bounds on the Information Rate of Secret Sharing Schemes
    Carlo Blundo
    Alfredo De Santis
    Roberto De Simone
    Ugo Vaccaro
    Designs, Codes and Cryptography, 1997, 11 (2) : 107 - 110
  • [44] MODEL SECRET SHARING SCHEMES IN SYSTEMS TRANSMIT VIDEO
    Sagaydak, D. A.
    Faizullin, R. T.
    COMPUTER OPTICS, 2013, 37 (01) : 105 - 112
  • [45] Memory leakage-resilient secret sharing schemes
    Dai ShuGuang
    Wei JinFeng
    Zhang FangGuo
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 9
  • [46] Analysis of secret sharing schemes based on Nielsen transformations
    Kotov, Matvei
    Panteleev, Dmitry
    Ushakov, Alexander
    GROUPS COMPLEXITY CRYPTOLOGY, 2018, 10 (01) : 1 - 8
  • [47] Secret-Sharing Schemes for Very Dense Graphs
    Amos Beimel
    Oriol Farràs
    Yuval Mintz
    Journal of Cryptology, 2016, 29 : 336 - 362
  • [48] Further results on strongbox secured secret sharing schemes
    Gamble, G
    Maenhaut, BM
    Seberry, J
    Street, AP
    UTILITAS MATHEMATICA, 2004, 66 : 165 - 193
  • [49] CHEATING DETECTION AND CHEATER IDENTIFICATION IN SECRET SHARING SCHEMES
    WU, TC
    WU, TS
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 367 - 369
  • [50] On the Local Leakage Resilience of Linear Secret Sharing Schemes
    Fabrice Benhamouda
    Akshay Degwekar
    Yuval Ishai
    Tal Rabin
    Journal of Cryptology, 2021, 34