Cryptography Reference
In-Depth Information
4.6 Summary
Secret-sharing is an ideal method for distributing documents across
the network so no one can find them. It is an ideal way for people to
deny responsibility. In some cases, the parts of the secret can be from
the Web pages of people who have nothing to do with the matter at
hand.
The Disguise Secret sharing lets you share the blame.
How Secure Is It? The algorithms here are unconditionally secure
against attacks from people who have less than the necessary
threshold of parts.
How to Use It. The XOR algorithm described here is easy to imple-
ment. It is an ideal way to split up information so that every
party needs to be present to put the information back together.
Search WWH ::




Custom Search