Academic Journal

Unique Keys Enabling Multithreshold Schemes

Bibliographic Details
Title: Unique Keys Enabling Multithreshold Schemes
Authors: Hannes Hassler, Reinhard Posch
Contributors: The Pennsylvania State University CiteSeerX Archives
Superior Title: http://www.infosys.tuwien.ac.at/Staff/vh/papers/multhr.ps.gz.
Publication Year: 1993
Collection: CiteSeerX
Description: We present a generalization of Shamir's threshold scheme [5]. The Shamir's scheme shows how to divide a key D into n pieces such that it is easily reconstructable from any k pieces, but that even complete knowledge of k \Gamma 1 pieces reveals no information about D. Shamir calls it a (k,n) threshold scheme. We propose a system with s security levels, each of them requiring k l partial keys for computation of a secret key D l for level l. The higher is the security level, the more keys are required. We call our scheme a (k l ; s; n) multithreshold scheme, l = 1; \Delta \Delta \Delta ; s. 1 Introduction We consider the following scenario. A group of ten experts is responsible for operating a protected system. To perform some minor changes in the system, at least three of them must be present. If they want to change more sensitive parts, more experts from the group have to agree. The more of them are involved, the more sensitive parts of the system under protection are accessible. W.
Document Type: text
File Description: application/postscript
Language: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.52.1707; http://www.infosys.tuwien.ac.at/Staff/vh/papers/multhr.ps.gz
Availability: http://www.infosys.tuwien.ac.at/Staff/vh/papers/multhr.ps.gz
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Accession Number: edsbas.12E8B91F
Database: BASE
Description
Description not available.