In this thesis, four different methods for secret sharing with threshold schemes will be investigated. We will discuss theory, implementation and security aspects. For example, we show how some known attacks are implemented.The methods considered in this thesis, are the schemes by Shamir, Blakley, Mignotte and Asmuth-Bloom.
Identifer | oai:union.ndltd.org:UPSALLA1/oai:DiVA.org:lnu-97619 |
Date | January 2020 |
Creators | Johansson, Håkan |
Publisher | Linnéuniversitetet, Institutionen för matematik (MA) |
Source Sets | DiVA Archive at Upsalla University |
Language | English |
Detected Language | English |
Type | Student thesis, info:eu-repo/semantics/bachelorThesis, text |
Format | application/pdf |
Rights | info:eu-repo/semantics/openAccess |
Page generated in 0.0014 seconds