Verifiable secret sharing for monotone access structures

Thomas Beth, Hans-Joachim Knobloch, Marcus Otten
<span title="">1993</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="" style="color: black;">Proceedings of the 1st ACM conference on Computer and communications security - CCS &#39;93</a> </i> &nbsp;
Several verifiable secret sharing schemes for threshold schemes based on polynomial interpolation have been presel~ted in the literature. Simmons and others introduced secret sharing (also called shared control) schemes based on fiRite geometries, which allow istributing a secret according to any monotone access structure. In this paper we present a verifiable secret sharing scheme for a class of these geometry-based secret sharing schemes, which thus provides verifiable sharing of secrets
more &raquo; ... ding to general monotone access structures. Our scheme relies on the homomorphic properties of the discrete exponentiation and therefore on the cryptographic security of the discrete logarithm. The version based on Simmons' scheme is non-interactive.
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="">doi:10.1145/168588.168612</a> <a target="_blank" rel="external noopener" href="">dblp:conf/ccs/BethKO93</a> <a target="_blank" rel="external noopener" href="">fatcat:tzhmbrpc6ndjdl5ysojkckl5wm</a> </span>
<a target="_blank" rel="noopener" href="" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href=""> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> </button> </a>