[[abstract]]An (m, n) threshold scheme is to decompose the master key K into n secret shadows in such a way that the master key K cannot be reclaimed unless any m shadows are collected. However, any m-1 or fewer shadows provide absolutely no information about K. In 1989, Laih et al. proposed the concept of dynamic threshold schemes which allow the master key to be updated without changing the secret shadows. However, the perfect dynamic threshold scheme, which provides perfect secrecy though the master key is allowed to be changed, has not been proposed. Nor has any paper shown the existence of perfect dynamic threshold schemes. In this paper, we prove that perfect dynamic threshold schemes do not exist when their master keys need be update...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
Abstract. In this paper, we investigate the problem of increasing the threshold parameter of the Sha...
[[abstract]]This paper presents a two-layered structure for optimally sharing a secret image among s...
[[abstract]]To improve the efficiency for the threshold schemes, the major problem is that the secre...
. We present a generalization of Shamir's threshold scheme [5]. The Shamir's scheme shows ...
This paper studies the methods for changing thresholds in the absence of secure channels after the s...
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, th...
Every t-dynamic proper n-coloring of a graph G describes a shadow allocation of any (n,t+1)-threshol...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
AbstractThis paper studies the methods for changing thresholds in the absence of secure channels aft...
A dealer-free and non-interactive dynamic threshold secret sharing scheme has been proposed by Harn ...
[[abstract]]In 2000, Wang et al. proposed a new (t, n) threshold signature scheme with (k, l) thresh...
With the goal of ensuring availability of security services such as encryption and authentication, w...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
A threshold changeable secret sharing (TCSS) scheme is designed for changing the initial threshold p...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
Abstract. In this paper, we investigate the problem of increasing the threshold parameter of the Sha...
[[abstract]]This paper presents a two-layered structure for optimally sharing a secret image among s...
[[abstract]]To improve the efficiency for the threshold schemes, the major problem is that the secre...
. We present a generalization of Shamir's threshold scheme [5]. The Shamir's scheme shows ...
This paper studies the methods for changing thresholds in the absence of secure channels after the s...
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, th...
Every t-dynamic proper n-coloring of a graph G describes a shadow allocation of any (n,t+1)-threshol...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
AbstractThis paper studies the methods for changing thresholds in the absence of secure channels aft...
A dealer-free and non-interactive dynamic threshold secret sharing scheme has been proposed by Harn ...
[[abstract]]In 2000, Wang et al. proposed a new (t, n) threshold signature scheme with (k, l) thresh...
With the goal of ensuring availability of security services such as encryption and authentication, w...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
A threshold changeable secret sharing (TCSS) scheme is designed for changing the initial threshold p...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
Abstract. In this paper, we investigate the problem of increasing the threshold parameter of the Sha...
[[abstract]]This paper presents a two-layered structure for optimally sharing a secret image among s...