z-logo
open-access-imgOpen Access
Information Security Theory and Practice
Author(s) -
Maryline Laurent,
Thanassis Giannetsos
Publication year - 2020
Publication title -
lecture notes in computer science
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.249
H-Index - 400
eISSN - 1611-3349
pISSN - 0302-9743
DOI - 10.1007/978-3-030-41702-4
Subject(s) - computer science , computer security , information security , authentication (law) , cryptography , the internet , field (mathematics) , internet privacy , world wide web , mathematics , pure mathematics
Secret sharing splits a secret s into shares in such a way that k ≤ shares suffice to reconstruct s. Let ρi,j be the probability that shareholder i disclose their share to shareholder j, with 0 ≤ i, j < n. Given k ≤ ≤ n, to whom individuals should we hand shares, if we wish to minimize the probability that one of them reconstitutes s?

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom