AbstractThis paper introduces the generalization of Mignotte modular secret sharing over the polynomial rings. Mignotte proposed threshold secret sharing over the ring of integers. We extend his method for the ring of polynomials which is Euclidean as well and therefore allowing to use the Chinese Remainder Theorem. In particular, we prove that any access structure can be realized within this modular approach. Further, we put the bounds on the number of participants of such secret sharing scheme with the moduli of the same degree. And finally we estimate the information rate of the new scheme
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Secret sharing, which refers to methods of distributing a secret value among a group of participants...
Полный текст документа находится на www.elsevier.com/locate/entcsThis paper introduces the generaliz...
Secret Sharing Schemes (SSS) are methods for distributing a secret among a set of participants. One ...
Secret sharing scheme is an efficient method to hide secret key or secret image by partitioning it i...
Полный текст документа находится на http://www.computer.org/portal/web/csdl/doi/10.1109/SYNASC.2008....
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
Abstract Multilevel and compartmented access structures are two important classes of access structur...
The secret sharing schemes are the important tools in cryptography that are used as building blocks ...
The secret sharing schemes are the important tools in cryptography that are used as building blocks ...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Secret sharing, which refers to methods of distributing a secret value among a group of participants...
Полный текст документа находится на www.elsevier.com/locate/entcsThis paper introduces the generaliz...
Secret Sharing Schemes (SSS) are methods for distributing a secret among a set of participants. One ...
Secret sharing scheme is an efficient method to hide secret key or secret image by partitioning it i...
Полный текст документа находится на http://www.computer.org/portal/web/csdl/doi/10.1109/SYNASC.2008....
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
Abstract Multilevel and compartmented access structures are two important classes of access structur...
The secret sharing schemes are the important tools in cryptography that are used as building blocks ...
The secret sharing schemes are the important tools in cryptography that are used as building blocks ...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Secret sharing, which refers to methods of distributing a secret value among a group of participants...