Secret sharing: A comprehensive survey, taxonomy and applications
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …
magnificent development in information and communication technology. Likewise …
A (t, n) multi-secret sharing scheme
In the (t, n) multi-secret sharing scheme, there are n participants in the system. At least t or
more participants can easily pool their secrets shadows and reconstruct p secrets at the …
more participants can easily pool their secrets shadows and reconstruct p secrets at the …
A Practical (t,n) Multi-Secret Sharing Scheme
Based on the systematic block codes, we propose a (t, n) multi-secret sharing scheme.
Compared with the previous works, our scheme has the advantages of smaller …
Compared with the previous works, our scheme has the advantages of smaller …
LaF: Lattice-based and communication-efficient federated learning
Federated learning is an emerging technology which allows a server to train a global model
with the cooperation of participants without exposing the participants' data. In recent years …
with the cooperation of participants without exposing the participants' data. In recent years …
Multiple ramp schemes
A (t, k, n, S) ramp scheme is a protocol to distribute a secret s chosen in S among a set P of n
participants in such a way that:(1) sets of participants of cardinality greater than or equal to k …
participants in such a way that:(1) sets of participants of cardinality greater than or equal to k …
An ideal multi-secret sharing scheme based on MSP
CF Hsu, Q Cheng, X Tang, B Zeng - Information Sciences, 2011 - Elsevier
A multi-secret sharing scheme is a protocol to share m arbitrarily related secrets s1,…, sm
among a set of n participants. In this paper, we propose an ideal linear multi-secret sharing …
among a set of n participants. In this paper, we propose an ideal linear multi-secret sharing …
A new multi-stage secret sharing scheme using one-way function
He and Dawson proposed a multi-stage secret sharing scheme based on one-way function.
In that scheme, many secrets are reconstructed stage-by-stage in the dealer's …
In that scheme, many secrets are reconstructed stage-by-stage in the dealer's …
An improvement on the Lin–Wu (t, n) threshold verifiable multi-secret sharing scheme
Lin and Wu [IEE Proc. Comput. Digit. Tech. 146 (1999) 264] have proposed an efficient (t, n)
threshold verifiable multi-secret sharing (VMSS) scheme based on the factorization problem …
threshold verifiable multi-secret sharing (VMSS) scheme based on the factorization problem …
Attacks to some verifiable multi-secret sharing schemes and two improved schemes
Secret sharing plays an important role in protecting confidential information from being lost,
destroyed, or falling into wrong hands. Verifiable multi-secret sharing enables a dealer to …
destroyed, or falling into wrong hands. Verifiable multi-secret sharing enables a dealer to …
Authenticable quantum multi-secret sharing scheme based on monotone span program
L Li, Z Han, F Guan - Quantum Information Processing, 2023 - Springer
Quantum multi-secret sharing plays a vital role in secure multi-key management. In this
paper, an authenticable quantum multi-secret sharing scheme based on monotone span …
paper, an authenticable quantum multi-secret sharing scheme based on monotone span …