Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wen-Ai Jackson is active.

Publication


Featured researches published by Wen-Ai Jackson.


Designs, Codes and Cryptography | 1994

Geometric secret sharing schemes and their duals

Wen-Ai Jackson; Keith M. Martin

Given a set of participants we wish to distribute information relating to a secret in such a way that only specified groups of participants can reconstruct the secret. We consider here a special class of such schemes that can be described in terms of finite geometries as first proposed by Simmons. We formalize the Simmons model and show that given a geometric scheme for a particular access structure it is possible to find another geometric scheme whose access structure is the dual of the original scheme, and which has the same average and worst-case information rates as the original scheme. In particular this shows that if an ideal geometric scheme exists then an ideal geometric scheme exists for the dual access structure.


Designs, Codes and Cryptography | 1996

Perfect Secret Sharing Schemes on Five Participants

Wen-Ai Jackson; Keith M. Martin

A perfect secret sharing scheme is a system for the protection of a secret among a number of participants in such a way that only certain subsets of these participants can reconstruct the secret, and the remaining subsets can obtain no additional information about the secret. The efficiency of a perfect secret sharing scheme can be assessed in terms of its information rates. In this paper we discuss techniques for obtaining bounds on the information rates of perfect secret sharing schemes and illustrate these techniques using the set of monotone access structures on five participants. We give a full listing of the known informtion rate bounds for all the monotone access structures on five participants.


international cryptology conference | 1994

Multisecret Threshold Schemes

Wen-Ai Jackson; Keith M. Martin; Christine M. O'Keefe

A threshold scheme is a system that protects a secret (key) among a group of participants in such a way that it can only be reconstructed from the joint information held by some predetermined number of these participants. In this paper we extend this problem to one where there is more than one secret that participants can reconstruct using the information that they hold. In particular we consider the situation where there is a secret sK associated with each k-subset K of participants and sK can be reconstructed by any group of t participants in K (t ? k). We establish bounds on the minimum amount of information that participants must hold in order to ensure that up to w participants (0 ? w ? n - k + t - 1) cannot obtain any information about a secret with which they are not associated. We also discuss examples of systems that satisfy this bound.


International Conference on the Theory and Application of Cryptology | 1994

On sharing many secrets

Wen-Ai Jackson; Keith M. Martin; Christine M. O'Keefe

We consider secret sharing schemes which, through an initial issuing of shares to a group of participants, permit a number of different secrets to be protected. Each secret is associated with a (potentially different) access structure and a particular secret can be reconstructed by any group of participants from its associated access structure without the need for further broadcast information. Two distinct problems are addressed. Firstly we consider ideal secret sharing schemes in this more general environment. In particular, we classify the collections of access structures that can be combined in such an ideal secret sharing scheme and we provide a general method of construction for such schemes. We also explore the extent to which the results that connect ideal secret sharing schemes to matroids can be appropriately generalised. Secondly we consider secret sharing schemes that can be used more than once. This problem can be considered as a type of secret sharing scheme wi! th different secrets but with the same access structure for each of the secrets.


Journal of Cryptology | 1996

Ideal secret sharing schemes with multiple secrets

Wen-Ai Jackson; Keith M. Martin; Christine M. O'Keefe

We consider secret sharing schemes which, through an initial issuing of shares to a group of participants, permit a number of different secrets to be protected. Each secret is associated with a (potentially different) access structure and a particular secret can be reconstructed by any group of participants from its associated access structure without the need for further broadcast information. We consider ideal secret sharing schemes in this more general environment. In particular, we classify the collections of access structures that can be combined in such an ideal secret sharing scheme and we provide a general method of construction for such schemes. We also explore the extent to which the results that connect ideal secret sharing schemes to matroids can be appropriately generalized.


IEEE Transactions on Information Theory | 2005

Updating the parameters of a threshold scheme by minimal broadcast

Susan G. Barwick; Wen-Ai Jackson; Keith M. Martin

Threshold schemes allow secret data to be protected among a set of participants in such a way that only a prespecified threshold of participants can reconstruct the secret from private information (shares) distributed to them on a system setup using secure channels. We consider the general problem of designing unconditionally secure threshold schemes whose defining parameters (the threshold and the number of participants) can later be changed by using only public channel broadcast messages. In this paper, we are interested in the efficiency of such threshold schemes, and seek to minimize storage costs (size of shares) as well as optimize performance in low-bandwidth environments by minimizing the size of necessary broadcast messages. We prove a number of lower bounds on the smallest size of broadcast message necessary to make general changes to the parameters of a threshold scheme in which each participant already holds shares of minimal size. We establish the tightness of these bounds by demonstrating optimal schemes.


theory and application of cryptographic techniques | 1992

Cumulative Arrays and Geometric Secret Sharing Schemes

Wen-Ai Jackson; Keith M. Martin

Cumulative secret sharing schemes were introduced by Simmons et al (1991) based on the generalised secret sharing scheme of Ito et al (1987). A given monotone access structure together with a security level is associated with a unique cumulative scheme. Geometric secret sharing schemes form a wide class of secret sharing schemes which have many desirable properties including good information rates. We show that every non-degenerate geometric secret sharing scheme is ‘contained’ in the corresponding cumulative scheme. As there is no known practical algorithm for constructing efficient secret sharing schemes, the significance of this result is that, at least theoretically, a geometric scheme can be constructed from the corresponding cumulative scheme.


Designs, Codes and Cryptography | 1996

A Construction for Multisecret Threshold Schemes

Wen-Ai Jackson; Keith M. Martin; Christine M. O'Keefe

AbstractA multisecret threshold scheme is a system that protects a number of secrets (or keys) among a group of participants, as follows. Given a set of n participants, there is a secret sK associated with each k–subset K of these participants. The scheme ensures that sK can be reconstructed by any group of t participants in K (


Designs, Codes and Cryptography | 1998

A General Decomposition Construction for Incomplete SecretSharing Schemes

Marten van Dijk; Wen-Ai Jackson; Keith M. Martin


Journal of Cryptology | 1997

Mutually Trusted Authority-Free Secret Sharing Schemes

Wen-Ai Jackson; Keith M. Martin; Christine M. O'Keefe

1 < t < k

Collaboration


Dive into the Wen-Ai Jackson's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Christine M. O’Keefe

Commonwealth Scientific and Industrial Research Organisation

View shared research outputs
Top Co-Authors

Avatar

Marten van Dijk

University of Connecticut

View shared research outputs
Top Co-Authors

Avatar

Tim Penttila

Colorado State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge