Show simple item record

dc.contributor.advisorGligoroski, Danilonb_NO
dc.contributor.advisorLaur, Svennb_NO
dc.contributor.authorKahrs, Katharinanb_NO
dc.date.accessioned2014-12-19T14:12:29Z
dc.date.available2014-12-19T14:12:29Z
dc.date.created2010-09-03nb_NO
dc.date.issued2009nb_NO
dc.identifier347813nb_NO
dc.identifierntnudaim:4620nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/261810
dc.description.abstractIn this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold linear secret sharing schemes, over fields and rings in a compact and concise way. We explain two characterisations of linear secret sharing schemes, and in particular, we characterise threshold linear secret sharing schemes. We develop an algorithm to generate all multiplicative $(t+1)$-out-of-$n$ threshold linear secret sharing schemes over a field $mathbb{Z}sb{p}$. For the ring $mathbb{Z}sb{2sp{32}}$, we explain the generation of secret sharing schemes for threshold access structures and prove the non-existence of $(t+1)$-out-of-$n$ threshold linear secret sharing schemes with $n > t+1$.nb_NO
dc.languageengnb_NO
dc.publisherInstitutt for telematikknb_NO
dc.subjectntnudaimno_NO
dc.subjectMSSECMOB Master in Security and Mobile Computingno_NO
dc.subjectInformation securityno_NO
dc.titleShare Computing Protocols over Fields and Ringsnb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber94nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikknb_NO


Files in this item

Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record