Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

A (t, n) multi-secret sharing scheme

CC Yang, TY Chang, MS Hwang - Applied Mathematics and Computation, 2004 - Elsevier
In the (t, n) multi-secret sharing scheme, there are n participants in the system. At least t or
more participants can easily pool their secrets shadows and reconstruct p secrets at the …

A Practical (t,n) Multi-Secret Sharing Scheme

HY Chien, JK Jan, YM Tseng - IEICE transactions on fundamentals …, 2000 - search.ieice.org
Based on the systematic block codes, we propose a (t, n) multi-secret sharing scheme.
Compared with the previous works, our scheme has the advantages of smaller …

LaF: Lattice-based and communication-efficient federated learning

P Xu, M Hu, T Chen, W Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Federated learning is an emerging technology which allows a server to train a global model
with the cooperation of participants without exposing the participants' data. In recent years …

Multiple ramp schemes

A De Santis, B Masucci - IEEE Transactions on Information …, 1999 - ieeexplore.ieee.org
A (t, k, n, S) ramp scheme is a protocol to distribute a secret s chosen in S among a set P of n
participants in such a way that:(1) sets of participants of cardinality greater than or equal to k …

An ideal multi-secret sharing scheme based on MSP

CF Hsu, Q Cheng, X Tang, B Zeng - Information Sciences, 2011 - Elsevier
A multi-secret sharing scheme is a protocol to share m arbitrarily related secrets s1,…, sm
among a set of n participants. In this paper, we propose an ideal linear multi-secret sharing …

A new multi-stage secret sharing scheme using one-way function

TY Chang, MS Hwang, WP Yang - ACM SIGOPS Operating Systems …, 2005 - dl.acm.org
He and Dawson proposed a multi-stage secret sharing scheme based on one-way function.
In that scheme, many secrets are reconstructed stage-by-stage in the dealer's …

An improvement on the Lin–Wu (t, n) threshold verifiable multi-secret sharing scheme

TY Chang, MS Hwang, WP Yang - Applied Mathematics and Computation, 2005 - Elsevier
Lin and Wu [IEE Proc. Comput. Digit. Tech. 146 (1999) 264] have proposed an efficient (t, n)
threshold verifiable multi-secret sharing (VMSS) scheme based on the factorization problem …

Attacks to some verifiable multi-secret sharing schemes and two improved schemes

Y Liu, F Zhang, J Zhang - Information Sciences, 2016 - Elsevier
Secret sharing plays an important role in protecting confidential information from being lost,
destroyed, or falling into wrong hands. Verifiable multi-secret sharing enables a dealer to …

Authenticable quantum multi-secret sharing scheme based on monotone span program

L Li, Z Han, F Guan - Quantum Information Processing, 2023 - Springer
Quantum multi-secret sharing plays a vital role in secure multi-key management. In this
paper, an authenticable quantum multi-secret sharing scheme based on monotone span …