A verifiable secret sharing scheme with combiner verification and cheater identification
In threshold secret sharing (SS) scheme, widely known as (k, n) threshold secret sharing, a
secret S is divided into n shares and distributed to participants by a dealer in such a way that …
secret S is divided into n shares and distributed to participants by a dealer in such a way that …
Multilevel threshold secret sharing based on the Chinese Remainder Theorem
L Harn, M Fuyou - Information processing letters, 2014 - Elsevier
The (t, n) threshold secret sharing schemes (SSs) were introduced by Shamir and Blakley
separately in 1979. Multilevel threshold secret sharing (MTSS) is a generalization of …
separately in 1979. Multilevel threshold secret sharing (MTSS) is a generalization of …
Verifiable secret sharing based on the Chinese remainder theorem
ABSTRACT A (t, n) secret sharing scheme (SS) enables a dealer to divide a secret into n
shares in such a way that (i) the secret can be recovered successfully with t or more than t …
shares in such a way that (i) the secret can be recovered successfully with t or more than t …
A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets
Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many
applications of information security in recent years. A VSS enables a dealer to divide a …
applications of information security in recent years. A VSS enables a dealer to divide a …
A hybrid-based verifiable secret sharing scheme using Chinese remainder theorem
OP Verma, N Jain, SK Pal - Arabian Journal for Science and Engineering, 2020 - Springer
It is not always in the best interests to rely on an individual to have control of entire sensitive
information. This has led to the need for secret sharing schemes, which divide secret (key) …
information. This has led to the need for secret sharing schemes, which divide secret (key) …
Chinese remainder theorem-based RSA-threshold cryptography in MANET using verifiable secret sharing scheme
A mobile ad hoc network (MANET) is an infrastructure-less system having no designated
access points or routers and it has a dynamic topology. MANETs follow a distributed …
access points or routers and it has a dynamic topology. MANETs follow a distributed …
[PDF][PDF] CRT based threshold multi secret sharing scheme
This paper presents a novel secret sharing system that is based on Chinese remainder
theorem. This scheme deals with a concept of multiple secrets to be shared to different …
theorem. This scheme deals with a concept of multiple secrets to be shared to different …
[PDF][PDF] A multi-secret sharing scheme based on the CRT and RSA
X Dong - International Journal of Electronics and Information …, 2015 - ijeie.jalaxy.com.tw
In this paper, we propose to enhance threshold secret sharing schemes based on the
Chinese remainder theorem (CRT) by incorporating the well-known RSA Cryptosystem. In …
Chinese remainder theorem (CRT) by incorporating the well-known RSA Cryptosystem. In …
[PDF][PDF] A framework to improve the network security with less mobility in MANET
I Kaur, A Rao - Int J Comput Appl, 2017 - academia.edu
Infrastructures less network is MANET which creates the temporary network. Performance
and security are its two major issues. Due to its self organizing feature providing runtime …
and security are its two major issues. Due to its self organizing feature providing runtime …
[PDF][PDF] Weighted Secret Sharing Based on the Chinese Remainder Theorem.
L Harn, F Miao - Int. J. Netw. Secur., 2014 - Citeseer
In a),(nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way
that (a) the secret can be recovered successfully with t or more than t shares, and (b) the …
that (a) the secret can be recovered successfully with t or more than t shares, and (b) the …