Abstract
A generalized linear threshold scheme is introduced. The new scheme generalizes the existing linear threshold schemes. The basic principles involved in the construction of linear threshold schemes are laid out and the relationships between the existing schemes are completely established. The generalized linear scheme is used to provide a hierarchical threshold scheme which allows multiple thresholds necessary in a hierarchical environment.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Blakely G.R., “Safeguarding Cryptographic Keys”, Proceeding of the National Computer Conference, 1979, AFIPS Conference Proceedings, Vol. 48 (1979), pp. 313–317.
Blakely G.R. and Laif Swanson, “Security Proofs for Information Protection Systems”, Proceedings of the 1981 symposium on Security and Privacy, IEEE Computer Society, 1981, pp. 75–88.
Bloom J.R., “A Note on Superfast Threshold Schemes”, Preprint Texas A&M University, Department of Mathematics (1981).
Diffie W. and Hellman, M.E.. “New Directions in Cryptography”, IEEE Trans. Inform. Theory, Vol. IT-22, No. 6, November 1976, pp. 644–654.
Karnin. Greene and Hellman, “On Secret Sharing Systems”, IEEE Transactions on Information Theory, Vol. IT-29, (1983), pp. 35–41.
Kuiper, “Linear Algebra and Geometry”, North-Holland Publishing Company-Amsterdam, Second Edition, 1965.
Rivest R.L., A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”, Communications of the ACM, Vol. 21, 1978, pp. 120–126.
Shamir A.. “How to Share a Secret”, Communications of the Am, Vol. 22, No. 11, Nov. 1979, pp. 612–613.
Shannon C.E., “Communication Theory of Secrecy of Secrecy Systems”, Bell System Technical Journal, 1948, pp. 656–715.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1985 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kothari, S.C. (1985). Generalized Linear Threshold Scheme. In: Blakley, G.R., Chaum, D. (eds) Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39568-7_19
Download citation
DOI: https://doi.org/10.1007/3-540-39568-7_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-15658-1
Online ISBN: 978-3-540-39568-3
eBook Packages: Springer Book Archive