Information Security Theory and Practice
Author(s) -
Maryline Laurent,
Thanassis Giannetsos
Publication year - 2020
Publication title -
lecture notes in computer science
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.249
H-Index - 400
eISSN - 1611-3349
pISSN - 0302-9743
DOI - 10.1007/978-3-030-41702-4
Subject(s) - computer science , computer security , information security , authentication (law) , cryptography , the internet , field (mathematics) , internet privacy , world wide web , mathematics , pure mathematics
Secret sharing splits a secret s into shares in such a way that k ≤ shares suffice to reconstruct s. Let ρi,j be the probability that shareholder i disclose their share to shareholder j, with 0 ≤ i, j < n. Given k ≤ ≤ n, to whom individuals should we hand shares, if we wish to minimize the probability that one of them reconstitutes s?
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom