AbstractIn verifiable multi-secret sharing schemes (VMSSs), many secrets can be shared but only one share is kept by each user and this share is verifiable by others. In this paper, we propose two secure, efficient, and verifiable (t,n) multi-secret sharing schemes, namely Scheme-I and Scheme-II. Scheme-I is based on the Lagrange interpolating polynomial and the LFSR-based public key cryptosystem. The Lagrange interpolating polynomial is used to split and reconstruct the secrets and the LFSR-based public key cryptosystem is employed to verify the validity of the data. Scheme-II is designed according to the LFSR sequence and the LFSR-based public key cryptosystem. We compare our schemes with the state-of-the-art in terms of attack resistance...
Secret sharing schemes are methods for distributing a secret among n participants in such a way that...
[[abstract]]In this paper, we propose a verifiable multi-secret sharing scheme. Some secrets are pro...
Secret sharing was proposed primarily in 1979 to solve the problem of key distribution. In recent de...
AbstractIn verifiable multi-secret sharing schemes (VMSSs), many secrets can be shared but only one ...
AbstractIn multi-secret sharing schemes, publishing shares during the process of reconstructing part...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483-490] propo...
A Secret sharing scheme is a method for dividing a secret into several partial information. The secr...
In a Multistage Secret Sharing (MSSS) scheme, the authorized subsets of participants could reconstru...
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. I...
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. I...
A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir ...
SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many ap...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some...
Secret sharing schemes are methods for distributing a secret among n participants in such a way that...
[[abstract]]In this paper, we propose a verifiable multi-secret sharing scheme. Some secrets are pro...
Secret sharing was proposed primarily in 1979 to solve the problem of key distribution. In recent de...
AbstractIn verifiable multi-secret sharing schemes (VMSSs), many secrets can be shared but only one ...
AbstractIn multi-secret sharing schemes, publishing shares during the process of reconstructing part...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483-490] propo...
A Secret sharing scheme is a method for dividing a secret into several partial information. The secr...
In a Multistage Secret Sharing (MSSS) scheme, the authorized subsets of participants could reconstru...
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. I...
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. I...
A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir ...
SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many ap...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some...
Secret sharing schemes are methods for distributing a secret among n participants in such a way that...
[[abstract]]In this paper, we propose a verifiable multi-secret sharing scheme. Some secrets are pro...
Secret sharing was proposed primarily in 1979 to solve the problem of key distribution. In recent de...