[[abstract]]Generalized secret sharing is a method of constructing secret sharing from the perspective of access structure. In this paper, we propose a novel solution for achieving generalized secret sharing with linear hierarchical secrets. We use a matrix to model the relationship related to the access structure and transfer the matrix to modular arithmetic, which is calculated by Chinese Remainder Theorem. The participants in the corresponding access structures can cooperate with each other to produce secrets in monotonous levels. We prove that shared secrets can be efficient and reconstructed only by the qualified subset of participants; unqualified participants cannot reconstruct the corresponding shared secret
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
Due to the rapid growth of the next generation networking and system technologies, computer net-work...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem...
Abstract. We consider the problem of threshold secret sharing in groups with hierarchical structure....
In a secret sharing scheme based upon access structures, each group has an authorization and only th...
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access struc...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
Due to the rapid growth of the next generation networking and system technologies, computer net-work...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem...
Abstract. We consider the problem of threshold secret sharing in groups with hierarchical structure....
In a secret sharing scheme based upon access structures, each group has an authorization and only th...
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access struc...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...