Abstract. In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Chinese Remainder Theorem (CRT). We first show that two schemes proposed earlier are not secure from an attack where the dealer is able to distribute inconsistent shares to the users. Then we propose a new VSS scheme based on the CRT and prove its security. Using the proposed VSS scheme, we develop joint random secret sharing (JRSS) and proactive SSS protocols, which, to the best of our knowledge, are the first secure protocols of their kind based on the CRT
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) w...
A generalized Chinese Remainder Theorem (GCRT)-based multi-secret sharing (MSS) scheme, which can so...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many ap...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem...
In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmu...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use...
Abstract Multilevel and compartmented access structures are two important classes of access structur...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) w...
A generalized Chinese Remainder Theorem (GCRT)-based multi-secret sharing (MSS) scheme, which can so...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many ap...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem...
In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmu...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use...
Abstract Multilevel and compartmented access structures are two important classes of access structur...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) w...
A generalized Chinese Remainder Theorem (GCRT)-based multi-secret sharing (MSS) scheme, which can so...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...