A Secret sharing scheme is a method for dividing a secret into several partial information. The secret can be reconstructed if a certain number of partial information is collected. One of the known secret sharing schemes is Shamir's secret sharing scheme. It uses Lagrange interpolation (with one indeterminate) for reconstructing the secret. In this paper, we present a secret sharing scheme using multivariate polynomials with the secret reconstruction process using the multivariate interpolation formula derived by Saniee (2007). The resulted scheme can be considered as a generalization of the Shamir's secret sharing scheme
Secret sharing schemes are methods for distributing a secret among n participants in such a way that...
Privacy of the information is one of the major issues in digital world. However it is responsibility...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
A Secret sharing scheme is a method for dividing a secret into several partialinformation. The secre...
Abstract Secret sharing schemes have been well studied and widely used in different aspects of real ...
Abstract. We present a threshold secret sharing scheme based on poly-nomial interpolation and the Di...
A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir ...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
In this paper there are presented algorithms for multilevel hierarchical threshold secret sharing sc...
Secret sharing (SS) schemes have been widely used in secure computer communications systems. Recentl...
Given a set of participants that is partitioned into distinct compartments, a multi-partite access s...
AbstractIn verifiable multi-secret sharing schemes (VMSSs), many secrets can be shared but only one ...
Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1,...
Secret sharing schemes are methods for distributing a secret among n participants in such a way that...
Privacy of the information is one of the major issues in digital world. However it is responsibility...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
A Secret sharing scheme is a method for dividing a secret into several partialinformation. The secre...
Abstract Secret sharing schemes have been well studied and widely used in different aspects of real ...
Abstract. We present a threshold secret sharing scheme based on poly-nomial interpolation and the Di...
A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir ...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
In this paper there are presented algorithms for multilevel hierarchical threshold secret sharing sc...
Secret sharing (SS) schemes have been widely used in secure computer communications systems. Recentl...
Given a set of participants that is partitioned into distinct compartments, a multi-partite access s...
AbstractIn verifiable multi-secret sharing schemes (VMSSs), many secrets can be shared but only one ...
Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1,...
Secret sharing schemes are methods for distributing a secret among n participants in such a way that...
Privacy of the information is one of the major issues in digital world. However it is responsibility...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...