Two secret sharing schemes that use Asmuth-Bloom sequence and are based on Chinese Reminder Theorem (CRT) are proposed in this paper. The first scheme is designed for the case of a single se-cret and the second one is an extension of the first scheme to the case of multi-secrets. Novelty of the proposed schemes is that the shares of the participants are reusable i.e. same shares are applica-ble even with a new secret. Also only one share needs to be kept by each participant even for the multi-secret sharing scheme. Further, the schemes are capable of verifying the honesty of the participants including the dealer. Correctness of the schemes is also discussed. Keywords: Multi-Secret, Mignotte’s sequence, Asmuth-Bloom sequence
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use...
SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many ap...
Abstract Multilevel and compartmented access structures are two important classes of access structur...
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. I...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. I...
[[abstract]]Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in t...
In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmu...
A generalized Chinese Remainder Theorem (GCRT)-based multi-secret sharing (MSS) scheme, which can so...
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing...
[[abstract]]In this paper, we propose a verifiable multi-secret sharing scheme. Some secrets are pro...
Abstract. In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by us...
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use...
SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many ap...
Abstract Multilevel and compartmented access structures are two important classes of access structur...
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. I...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. I...
[[abstract]]Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in t...
In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmu...
A generalized Chinese Remainder Theorem (GCRT)-based multi-secret sharing (MSS) scheme, which can so...
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing...
[[abstract]]In this paper, we propose a verifiable multi-secret sharing scheme. Some secrets are pro...
Abstract. In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by us...
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...