Overview
Part of the book series: SpringerBriefs in Information Security and Cryptography (BRIEFSISC)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research.
This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.
Similar content being viewed by others
Keywords
Table of contents (10 chapters)
Authors and Affiliations
About the authors
Stephan Krenn received his PhD in computer science from the University of Fribourg (Switzerland). After postdoc positions at IST Austria and IBM Research - Zurich, he joined AIT's cryptography group in 2015, where he is now a senior scientist. His main research interests are in the domain of privacy-enhancing technologies, anonymous authentication, malleable digital signatures, or similar. He is actively participating in cryptographic standardization initiatives, and chair of IFIP WG11.6 on Identity Management.
Thomas LorĂ¼nser is a senior scientist and team leader in AIT’s Center for Digital Safety & Security with a strong background in digitization, IT security and applied cryptography. He holds a degree from Technical University of Vienna and various professional certifications (CISSP, zPM, CDPSE, ..). Additionally, he teaches selected topics in Cloud Computing, Internet of Things and IT Security and also actively contributes to security and cryptography standards in the International Organization for Standardization (ISO, JTC1/SC27).
Bibliographic Information
Book Title: An Introduction to Secret Sharing
Book Subtitle: A Systematic Overview and Guide for Protocol Selection
Authors: Stephan Krenn, Thomas LorĂ¼nser
Series Title: SpringerBriefs in Information Security and Cryptography
DOI: https://doi.org/10.1007/978-3-031-28161-7
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
Softcover ISBN: 978-3-031-28160-0Published: 29 March 2023
eBook ISBN: 978-3-031-28161-7Published: 28 March 2023
Series ISSN: 2731-9555
Series E-ISSN: 2731-9563
Edition Number: 1
Number of Pages: X, 76
Number of Illustrations: 2 b/w illustrations, 6 illustrations in colour
Topics: Cryptology, Systems and Data Security, Professional Computing, Communications Engineering, Networks