Open Access
Open access
Lecture Notes in Computer Science, pages 216-241

Geometric Shared Secret and/or Shared Control Schemes

Publication typeBook Chapter
Publication date1991-01-01
Q2
SJR0.606
CiteScore2.6
Impact factor
ISSN03029743, 16113349, 18612075, 18612083
Abstract
A shared secret scheme is normally specified in terms of a desired security, Pd, and a concurrence scheme, Γ. The concurrence scheme (aka access structure) identifies subsets of participants (also called trustees or shareholders) each of which should be able to cooperatively recover the secret and/or initiate the controlled action. The security requirement is expressed as the maximum acceptable probability, Pd, that the secret can be exposed or the controlled action initiated by a collection of persons that doesn’t include at least one of the authorized subsets identified in the concurrence scheme. A concurrence scheme is said to be monotone if every set of participants that includes one or more sets from Γ is also able to recover the secret. The closure of Γ, denoted by $$ \hat \Gamma $$ is the collection of all supersets (not necessarily proper) of the sets in Γ, i.e., the collection of all sets of participants that can recover the secret and/or initiate the controlled action. A shared secret scheme implementing a concurrence scheme Γ is said to be perfect if the probability of recovering the secret is the same for every set, C, of participants: C $$ \hat \Gamma $$ . Since, in particular, C could consist of only nonparticipants, i.e., of persons with no insider information about the secret, the probability, P, of an unauthorized recovery of the secret in a perfect scheme is just the probability of being able to “guess” the secret using only public information about Γ and the shared secret scheme implementing Γ: P ≤ Ptd.
Found 
Found 

Top-30

Journals

1
2
Lecture Notes in Computer Science
2 publications, 20%
Information Management & Computer Security
1 publication, 10%
Journal of Cryptology
1 publication, 10%
Discrete Mathematics
1 publication, 10%
International Journal of Electronics
1 publication, 10%
Lecture Notes in Electrical Engineering
1 publication, 10%
1
2

Publishers

1
2
3
4
Springer Nature
4 publications, 40%
Emerald
1 publication, 10%
Elsevier
1 publication, 10%
Taylor & Francis
1 publication, 10%
1
2
3
4
  • We do not take into account publications without a DOI.
  • Statistics recalculated only for publications connected to researchers, organizations and labs registered on the platform.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
Share
Cite this
GOST |
Cite this
GOST Copy
Simmons G. J. Geometric Shared Secret and/or Shared Control Schemes // Lecture Notes in Computer Science. 1991. pp. 216-241.
GOST all authors (up to 50) Copy
Simmons G. J. Geometric Shared Secret and/or Shared Control Schemes // Lecture Notes in Computer Science. 1991. pp. 216-241.
RIS |
Cite this
RIS Copy
TY - GENERIC
DO - 10.1007/3-540-38424-3_16
UR - https://doi.org/10.1007/3-540-38424-3_16
TI - Geometric Shared Secret and/or Shared Control Schemes
T2 - Lecture Notes in Computer Science
AU - Simmons, Gustavus J.
PY - 1991
DA - 1991/01/01
PB - Springer Nature
SP - 216-241
SN - 0302-9743
SN - 1611-3349
SN - 1861-2075
SN - 1861-2083
ER -
BibTex
Cite this
BibTex (up to 50 authors) Copy
@incollection{1991_Simmons,
author = {Gustavus J. Simmons},
title = {Geometric Shared Secret and/or Shared Control Schemes},
publisher = {Springer Nature},
year = {1991},
pages = {216--241},
month = {jan}
}
Found error?