Dive deeper into the intricacies of secret sharing schemes in this continuation lecture. Explore advanced concepts and techniques used in cryptography to securely distribute sensitive information among multiple parties. Learn about threshold schemes, Shamir's Secret Sharing, and their applications in secure multiparty computation. Gain insights into the mathematical foundations and practical implementations of these cryptographic protocols, enhancing your understanding of modern information security practices.
Overview
Syllabus
s-156: Secret Sharing (continued)
Taught by
TheIACR