By Topic

Weaknesses of protocols for updating the parameters of an established threshold scheme

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Martin, K.M. ; Inf. Security Group, London Univ., UK ; Nakahara, J., Jr.

Threshold schemes are adaptable cryptographic primitives that distribute trust in secret data by requiring k out of n entities to co-operate before the data can be recovered. An important security management issue relating to threshold schemes is the problem of updating the parameters of a threshold scheme. The paper discusses serious shortcomings in two proposed protocols for threshold parameter update

Published in:

Computers and Digital Techniques, IEE Proceedings -  (Volume:148 ,  Issue: 1 )