An incentive-compatible rational secret sharing scheme using blockchain and smart contract

Z Chen, Y Tian, C Peng - Science China Information Sciences, 2021 - Springer
In the rational cryptographic protocol, the two rational players often fall into the prisoner's
dilemma, which is also the case for the rational secret sharing we consider in this paper …

Consortium blockchain private key protection scheme based on rational secret sharing and blockchain

Z Yang, C Peng, C Zhong, Y Long - Computer Networks, 2024 - Elsevier
In a consortium blockchain, the loss of a private key can result in significant losses for users,
making the protection of private keys particularly crucial. Traditional distributed private key …

The optimal attack-defense scheme for secret sharing

J Ma, Y Chen, X Lv, X Qian - … on Internet of Things (iThings) and …, 2022 - ieeexplore.ieee.org
The attack-defense issue of secret sharing has been a pressing cryptography research
need. For solving this issue, this study proposes an optimal secret-share attack-defense …

General construction of revocable identity-based fully homomorphic signature

C **e, J Weng, W Lu, L Hou - Science China Information Sciences, 2020 - Springer
Dear editor, Fully homomorphic signature (FHS) is a cryptographic primitive and allows
anyone to conduct any computations over signatures and generate a signature which, when …

Server-aided multi-secret sharing scheme for weak computational devices

E Zhang, X Duan, S Yiu, J Fang… - Computers …, 2018 - research.monash.edu
In the setting of (t, n) threshold secret sharing, at least t parties can reconstruct the secret,
and fewer than t parties learn nothing about the secret. However, to achieve fairness, the …

A Key Recovery Scheme Based on Rational Secret Sharing in a Consortium Blockchain

C Peng - papers.ssrn.com
The user's private key in conjunction with their wallet is the only method of controlling digital
assets in consortium blockchain. The safety of the private key is crucial because if it is lost or …