Traceable Secret Sharing: Strong Security and Efficient Constructions by Aditi Partap
Traceable Secret Sharing: Strong Security and Efficient Constructions by Aditi Partap
Venue: Bharti 501 Abstract: Suppose Alice uses a t-out-of-n secret sharing to store her secret key on n servers. Her secret key is protected as long as t of them do not collude. However, what if a less-than-t subset of the servers decides to offer the shares they have for sale? In this case, Alice… Read More »Traceable Secret Sharing: Strong Security and Efficient Constructions by Aditi Partap
