Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

On sharing secrets and Reed-Solomon codes

Published: 01 September 1981 Publication History

Abstract

Shamir's scheme for sharing secrets is closely related to Reed-Solomon coding schemes. Decoding algorithms for Reed-Solomon codes provide extensions and generalizations of Shamir's method.

References

[1]
Berlekamp, E.R. Algebraic Coding Theory. McGraw-Hill, New York, 1968.
[2]
McEliece, R.J. The Theory of Information and Coding. Addison- Wesley, Reading MA, 1977.
[3]
Reed, I.S. and Solomon, G. Polynomial codes over certain finite fields. J. SIAM 8, 2 (June 1960), 300-304.
[4]
Sarwate, D.V. On the complexity of decoding Goppa codes. IEEE Trans. Inform. Theory 23, 4 (July 1977), 515-516.
[5]
Shamir, A. How to share a secret. Comm. A CM, 22, 11 (Nov. 1979), 612-613.
[6]
Sugiyama, Y., Kasahara, M., Hirasawa, S., and Namekawa, T. An erasures-and-errors decoding algorithm for Goppa codes. IEEE Trans. Inform. Theory 22, 2 (Mar. 1976), 238-241.

Cited By

View all
  • (2024)PowerBridge: Covert Air-Gap Exfiltration/Infiltration via Smart PlugApplied Sciences10.3390/app1414632114:14(6321)Online publication date: 19-Jul-2024
  • (2024)A study of secure communication with secret sharing method in MIMO eigen stream parallel channelsIEICE Communications Express10.23919/comex.2023XBL014413:3(72-75)Online publication date: Mar-2024
  • (2024)Variable-Length Orthogonal Codes over Finite Fields Realizing Data Multiplexing and Error Correction Coding SimultaneouslyIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023TAP0012E107.A:3(373-383)Online publication date: 1-Mar-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 24, Issue 9
Sept. 1981
72 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/358746
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 1981
Published in CACM Volume 24, Issue 9

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Reed-Solomon codes
  2. cryptography
  3. interpolation
  4. key management
  5. privacy
  6. secret sharing systems

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)631
  • Downloads (Last 6 weeks)75
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)PowerBridge: Covert Air-Gap Exfiltration/Infiltration via Smart PlugApplied Sciences10.3390/app1414632114:14(6321)Online publication date: 19-Jul-2024
  • (2024)A study of secure communication with secret sharing method in MIMO eigen stream parallel channelsIEICE Communications Express10.23919/comex.2023XBL014413:3(72-75)Online publication date: Mar-2024
  • (2024)Variable-Length Orthogonal Codes over Finite Fields Realizing Data Multiplexing and Error Correction Coding SimultaneouslyIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023TAP0012E107.A:3(373-383)Online publication date: 1-Mar-2024
  • (2024)Secure Archival is Hard... Really HardProceedings of the 16th ACM Workshop on Hot Topics in Storage and File Systems10.1145/3655038.3666093(38-46)Online publication date: 8-Jul-2024
  • (2024)Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data StorageIEEE/ACM Transactions on Networking10.1109/TNET.2023.328357732:1(253-267)Online publication date: Feb-2024
  • (2024)Optimal Two-Dimensional Reed–Solomon Codes Correcting Insertions and DeletionsIEEE Transactions on Information Theory10.1109/TIT.2024.338784870:7(5012-5016)Online publication date: 11-Apr-2024
  • (2024)Secret Sharing for DNA Probability VectorsICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10623016(4578-4583)Online publication date: 9-Jun-2024
  • (2024)SoK: Public Randomness2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP60621.2024.00020(216-234)Online publication date: 8-Jul-2024
  • (2024)BalancedSecAgg: Toward Fast Secure Aggregation for Federated LearningIEEE Access10.1109/ACCESS.2024.349177912(165265-165279)Online publication date: 2024
  • (2024)A New Security Measure in Secret Sharing Schemes and Secure Network CodingIEEE Access10.1109/ACCESS.2024.340147112(69163-69171)Online publication date: 2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media