A verifiable secret sharing scheme with combiner verification and cheater identification

S Kandar, BC Dhara - Journal of Information Security and Applications, 2020 - Elsevier
In threshold secret sharing (SS) scheme, widely known as (k, n) threshold secret sharing, a
secret S is divided into n shares and distributed to participants by a dealer in such a way that …

An efficient verifiable threshold multi-secret sharing scheme with different stages

D Chen, W Lu, W **ng, N Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Secret sharing is one of the most important cryptographic primitives used for data
outsourcing. The threshold-based secret sharing scheme is one of the well-known secret …

Threshold Key Management Scheme for Blockchain‐Based Intelligent Transportation Systems

T Zhou, J Shen, Y Ren, S Ji - Security and Communication …, 2021 - Wiley Online Library
Intelligent transportation systems (ITS) have always been an important application of Internet
of Things (IoT). Today, big data and cloud computing have further promoted the construction …

[HTML][HTML] Threshold-based post-quantum secure verifiable multi-secret sharing for distributed storage blockchain

S Mesnager, A Sınak, O Yayla - Mathematics, 2020 - mdpi.com
Blockchain systems store transaction data in the form of a distributed ledger where each
node stores a copy of all data, which gives rise to storage issues. It is well-known that the …

[PDF][PDF] A Secure Framework for Blockchain Transactions Protection.

WN Al-Sharu, MK Qabalin, M Naser… - Comput. Syst. Sci …, 2023 - researchgate.net
One of the most extensively used technologies for improving the security of IoT devices is
blockchain technology. It is a new technology that can be utilized to boost the security. It is a …

Key escrow protocol based on a tripartite authenticated key agreement and threshold cryptography

Z Wang, Z Ma, S Luo, H Gao - IEEE Access, 2019 - ieeexplore.ieee.org
While instant messaging systems bring convenience to people's lives and work, they also
make it easier for malicious users to discuss and plot illegal activities. Therefore …

[HTML][HTML] Homomorphic extensions of CRT-based secret sharing

O Ersoy, TB Pedersen, E Anarim - Discrete Applied Mathematics, 2020 - Elsevier
In this work, we explore the homomorphic aspect of CRT-based secret sharing schemes.
Secret sharing homomorphism is the notion of operating on multiple secrets by direct …

On modular (CRT-based) secret sharing

NN Shenets - Journal of Computer Virology and Hacking Techniques, 2024 - Springer
Secret sharing scheme (SSS) allows to share some secret s among n parties in such a way
that only certain subsets of them can recover the secret. The first SSSs were independently …

Multilevel threshold secret sharing based on the Chinese remainder theorem

O Ersoy, K Kaya, K Kaskaloglu - International Journal of Information …, 2019 - dergipark.org.tr
In multilevel secret sharing, a secret is shared among a set of hierarchically organized
participants in a way that the members of the superior compartments are more powerful and …

[PDF][PDF] A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network

M Zanab, H Ashraf, NZ Jhanjhi - 2023 - preprints.org
Due to the advancement and availability of internet in present age, device tend to become
wireless as well. Mobile ad-hoc network is a wireless environment that consist of advanced …