In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmuth Bloom secret sharing based on the Chinese Remainder Theorem (CRT). To achieve the desired result, we first show how to realize certain other threshold primitives using Asmuth Bloom secret sharing, such as joint random secret sharing, joint exponential random secret sharing, and joint exponential inverse random secret sharing. We prove the security of our scheme against a static adversary. To the best of our knowledge, this is the first provably secure threshold DSS scheme based on CRT. (C) 2013 Elsevier B.V. All rights reserved
A secret sharing scheme derives from a given secret certain shares (or shadows) which are distribute...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
Abstract. In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by us...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secr...
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem...
Compared with Shamir’s original secret image sharing (SIS), the Chinese-remainder-theorem-based SIS ...
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secr...
Two secret sharing schemes that use Asmuth-Bloom sequence and are based on Chinese Reminder Theorem ...
SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many ap...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
A secret sharing scheme derives from a given secret certain shares (or shadows) which are distribute...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
Abstract. In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by us...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secr...
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem...
Compared with Shamir’s original secret image sharing (SIS), the Chinese-remainder-theorem-based SIS ...
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secr...
Two secret sharing schemes that use Asmuth-Bloom sequence and are based on Chinese Reminder Theorem ...
SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many ap...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
A secret sharing scheme derives from a given secret certain shares (or shadows) which are distribute...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...