Abstract
In this paper some of the properties of the (t; n) threshold secret sharing schemes, based on the generalized vector space construction, are discussed. The relations between the size of the shares and the number of the users n in the (t; n) threshold secret sharing schemes are presented. Moreover, it is shown how a qualified set of users can effciently recover the secret in case of (2; n) and (3; n) threshold secret sharing schemes, exploiting the regular structure of the matrices corresponding to each of the n users.
Original language | English |
---|---|
Title of host publication | 2008 International Symposium on Information Theory and its Applications, ISITA2008 |
DOIs | |
Publication status | Published - 2008 |
Externally published | Yes |
Event | 2008 International Symposium on Information Theory and its Applications, ISITA2008 - Auckland Duration: 2008 Dec 7 → 2008 Dec 10 |
Other
Other | 2008 International Symposium on Information Theory and its Applications, ISITA2008 |
---|---|
City | Auckland |
Period | 08/12/7 → 08/12/10 |
ASJC Scopus subject areas
- Computer Science(all)