Multipartite Secret Sharing Based on CRT

@article{Hsu2014MultipartiteSS,
  title={Multipartite Secret Sharing Based on CRT},
  author={C. Hsu and L. Harn},
  journal={Wireless Personal Communications},
  year={2014},
  volume={78},
  pages={271-282}
}
  • C. Hsu, L. Harn
  • Published 2014
  • Computer Science
  • Wireless Personal Communications
Secure communication has become more and more important for system security. Since avoiding the use of encryption one by one can introduce less computation complexity, secret sharing scheme (SSS) has been used to design many security protocols. In SSSs, several authors have studied multipartite access structures, in which the set of participants is divided into several parts and all participants in the same part play an equivalent role. Access structures realized by threshold secret sharing are… Expand
10 Citations
Hierarchical threshold multi-secret sharing scheme based on Birkhoff interpolation and cellular automata
  • 4
Threshold Secret Sharing Scheme for Compartmented Access Structures
  • 7
Toward a formal proof for multi-secret sharing in the random oracle model
  • S. Mashhadi
  • Computer Science
  • Inf. Secur. J. A Glob. Perspect.
  • 2020
  • 1
An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem
  • 1
A CSA-Secure Multi-Secret Sharing Scheme in the Standard Model
  • 1
The development of secure mobile computing network based on secret sharing schemes
  • 1
How to Fairly Share Multiple Secrets Stage by Stage
  • 9
A Weighted Threshold Secret Sharing Scheme for Remote Sensing Images based on Chinese Remainder Theorem
  • 10
  • PDF

References

SHOWING 1-10 OF 34 REFERENCES
Verifiable secret sharing based on the Chinese remainder theorem
  • 29
Ideal Multipartite Secret Sharing Schemes
  • 81
  • PDF
Characterizing Ideal Weighted Threshold Secret Sharing
  • 112
  • PDF
General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting
  • Sorin Iftene
  • Computer Science
  • Electron. Notes Theor. Comput. Sci.
  • 2006
  • 101
  • PDF
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing
  • 54
  • PDF
Some Ideal Secret Sharing Schemes
  • 482
  • PDF
An authenticated group key distribution mechanism using theory of numbers
  • 19
  • PDF
Weighted Threshold Secret Sharing Schemes
  • 61
...
1
2
3
4
...