In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Chinese Remainder Theorem (CRT). We first show that two schemes proposed earlier are not secure by an attack where the dealer is able to distribute inconsistent shares to the users. Then we propose a new VSS scheme based on the CRT and prove its security. Using the proposed VSS scheme, we develop a joint random secret sharing (JRSS) protocol, which, to the best of our knowledge, is the first JRSS protocol based on the CRT. © 2008 Springer Berlin Heidelberg
Abstract Multilevel and compartmented access structures are two important classes of access structur...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
Two secret sharing schemes that use Asmuth-Bloom sequence and are based on Chinese Reminder Theorem ...
Abstract. In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by us...
SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many ap...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use...
In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmu...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing...
A secret sharing scheme derives from a given secret certain shares (or shadows) which are distribute...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) w...
[[abstract]]Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in t...
Abstract Multilevel and compartmented access structures are two important classes of access structur...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
Two secret sharing schemes that use Asmuth-Bloom sequence and are based on Chinese Reminder Theorem ...
Abstract. In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by us...
SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many ap...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use...
In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmu...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing...
A secret sharing scheme derives from a given secret certain shares (or shadows) which are distribute...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) w...
[[abstract]]Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in t...
Abstract Multilevel and compartmented access structures are two important classes of access structur...
AbstractThreshold secret sharing based on the Chinese remainder theorem has been considered by Migno...
Two secret sharing schemes that use Asmuth-Bloom sequence and are based on Chinese Reminder Theorem ...