For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret or when the secret domain is small enough for a brute-force attack by a powerful adversary. Unfortunately, all the Chinese Remainder Theorem-based verifiable secret sharing schemes in the literature are either insecure or suffer from the vulnerability of computationally hiding commitments. To the best of our knowledge, there exist five such studies where two of them were already proven to be insecure. In this work, we first show that two of the remaining schemes are also insecure, that is, the schemes reveal information on the secret even when the adversary is passive. In addition, the remaining one is only secure against a computationally b...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
Abstract. In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by us...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmu...
SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many ap...
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use...
In 2010, Resch and Plank proposed a computationally secure secret sharing scheme, called AONT-RS. We...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem...
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret...
Abstract. In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by us...
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Ch...
In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmu...
SUMMARY Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many ap...
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use...
In 2010, Resch and Plank proposed a computationally secure secret sharing scheme, called AONT-RS. We...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
We propose a new design technique for constructing secret sharing schemes over a potentially infinit...
In a), ( nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem ...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem...