Multilevel threshold secret sharing based on the Chinese remainder theorem
From MaRDI portal
Publication:2448863
DOI10.1016/j.ipl.2014.04.006zbMath1302.94052MaRDI QIDQ2448863
Publication date: 5 May 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2014.04.006
cryptography; Chinese remainder theorem; threshold value; Asmuth-Bloom secret-sharing scheme; multilevel secret sharing; multilevel secret-sharing scheme
11T71: Algebraic coding theory; cryptography (number-theoretic aspects)
94A60: Cryptography
94A62: Authentication, digital signatures and secret sharing
Related Items
ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls, Distributive weighted threshold secret sharing schemes, Constructing ideal secret sharing schemes based on Chinese remainder theorem, Randomized component based secure secret reconstruction in insecure networks, A collaborative secret sharing scheme based on the Chinese remainder theorem, A new threshold changeable secret sharing scheme based on the Chinese remainder theorem, Tightly coupled multi-group threshold secret sharing based on Chinese remainder theorem, Key exposure resistant group key agreement protocol, Ramp scheme based on CRT for polynomial ring over finite field, An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem
Cites Work
- How to share a secret
- A method for obtaining digital signatures and public-key cryptosystems
- Advanced Topics in Computional Number Theory
- How to Share a Secret
- A modular approach to key safeguarding
- A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item