Open Access
Lecture Notes in Computer Science, pages 216-241
Geometric Shared Secret and/or Shared Control Schemes
Publication type: Book Chapter
Publication date: 1991-01-01
Journal:
Lecture Notes in Computer Science
Q2
SJR: 0.606
CiteScore: 2.6
Impact factor: —
ISSN: 03029743, 16113349, 18612075, 18612083
Abstract
A shared secret scheme is normally specified in terms of a desired security, Pd, and a concurrence scheme, Γ. The concurrence scheme (aka access structure) identifies subsets of participants (also called trustees or shareholders) each of which should be able to cooperatively recover the secret and/or initiate the controlled action. The security requirement is expressed as the maximum acceptable probability, Pd, that the secret can be exposed or the controlled action initiated by a collection of persons that doesn’t include at least one of the authorized subsets identified in the concurrence scheme. A concurrence scheme is said to be monotone if every set of participants that includes one or more sets from Γ is also able to recover the secret. The closure of Γ, denoted by
$$
\hat \Gamma
$$
is the collection of all supersets (not necessarily proper) of the sets in Γ, i.e., the collection of all sets of participants that can recover the secret and/or initiate the controlled action. A shared secret scheme implementing a concurrence scheme Γ is said to be perfect if the probability of recovering the secret is the same for every set, C, of participants: C
$$
\hat \Gamma
$$
. Since, in particular, C could consist of only nonparticipants, i.e., of persons with no insider information about the secret, the probability, P, of an unauthorized recovery of the secret in a perfect scheme is just the probability of being able to “guess” the secret using only public information about Γ and the shared secret scheme implementing Γ: P ≤ Ptd.
Found
Found
Top-30
Journals
1
2
|
|
Lecture Notes in Computer Science
2 publications, 20%
|
|
Information Management & Computer Security
1 publication, 10%
|
|
Journal of Cryptology
1 publication, 10%
|
|
Discrete Mathematics
1 publication, 10%
|
|
International Journal of Electronics
1 publication, 10%
|
|
Lecture Notes in Electrical Engineering
1 publication, 10%
|
|
1
2
|
Publishers
1
2
3
4
|
|
Springer Nature
4 publications, 40%
|
|
Emerald
1 publication, 10%
|
|
Elsevier
1 publication, 10%
|
|
Taylor & Francis
1 publication, 10%
|
|
1
2
3
4
|
- We do not take into account publications without a DOI.
- Statistics recalculated only for publications connected to researchers, organizations and labs registered on the platform.
- Statistics recalculated weekly.
Are you a researcher?
Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
Cite this
GOST |
RIS |
BibTex
Cite this
GOST
Copy
Simmons G. J. Geometric Shared Secret and/or Shared Control Schemes // Lecture Notes in Computer Science. 1991. pp. 216-241.
GOST all authors (up to 50)
Copy
Simmons G. J. Geometric Shared Secret and/or Shared Control Schemes // Lecture Notes in Computer Science. 1991. pp. 216-241.
Cite this
RIS
Copy
TY - GENERIC
DO - 10.1007/3-540-38424-3_16
UR - https://doi.org/10.1007/3-540-38424-3_16
TI - Geometric Shared Secret and/or Shared Control Schemes
T2 - Lecture Notes in Computer Science
AU - Simmons, Gustavus J.
PY - 1991
DA - 1991/01/01
PB - Springer Nature
SP - 216-241
SN - 0302-9743
SN - 1611-3349
SN - 1861-2075
SN - 1861-2083
ER -
Cite this
BibTex (up to 50 authors)
Copy
@incollection{1991_Simmons,
author = {Gustavus J. Simmons},
title = {Geometric Shared Secret and/or Shared Control Schemes},
publisher = {Springer Nature},
year = {1991},
pages = {216--241},
month = {jan}
}