SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many applications of information security in recent years. A VSS enables a dealer to divide a secret s into n shares and allows shareholders to verify whether their shares are generated by the dealer consistently without revealing the secrecy of both shares and the secret. More specifically, shareholders can verify that (i) the secret can be recovered by any t or more than t shares and (ii) the secret cannot be obtained by fewer than t shares. Many VSSs are based on polynomial, and only a few of them are based on the Chinese Remainder Theorem (CRT). Recently, Harn et al. proposed a CRT-based VSS in which multiple verification secrets are used during...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
An $(n, t)$-Non-Interactive Verifiable Secret Sharing (NI-VSS) scheme allows a dealer to share a sec...
Verifiable secret sharing (VSS) protocols enable parties to share secrets while guaranteeing securit...
[[abstract]]Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in t...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
Abstract. In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by us...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use...
Introduction Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sha...
Two secret sharing schemes that use Asmuth-Bloom sequence and are based on Chinese Reminder Theorem ...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
. A secret sharing scheme allows to share a secret among several participants such that only certain...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
An $(n, t)$-Non-Interactive Verifiable Secret Sharing (NI-VSS) scheme allows a dealer to share a sec...
Verifiable secret sharing (VSS) protocols enable parties to share secrets while guaranteeing securit...
[[abstract]]Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in t...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
Abstract. In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by us...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use...
Introduction Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sha...
Two secret sharing schemes that use Asmuth-Bloom sequence and are based on Chinese Reminder Theorem ...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
. A secret sharing scheme allows to share a secret among several participants such that only certain...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
An $(n, t)$-Non-Interactive Verifiable Secret Sharing (NI-VSS) scheme allows a dealer to share a sec...
Verifiable secret sharing (VSS) protocols enable parties to share secrets while guaranteeing securit...