Return to search

Secret Sharing with Threshold Schemes

In this thesis, four different methods for secret sharing with threshold schemes will be investigated. We will discuss theory, implementation and security aspects. For example, we show how some known attacks are implemented.The methods considered in this thesis, are the schemes by Shamir, Blakley, Mignotte and Asmuth-Bloom.

Identiferoai:union.ndltd.org:UPSALLA1/oai:DiVA.org:lnu-97619
Date January 2020
CreatorsJohansson, Håkan
PublisherLinnéuniversitetet, Institutionen för matematik (MA)
Source SetsDiVA Archive at Upsalla University
LanguageEnglish
Detected LanguageEnglish
TypeStudent thesis, info:eu-repo/semantics/bachelorThesis, text
Formatapplication/pdf
Rightsinfo:eu-repo/semantics/openAccess

Page generated in 0.0373 seconds