Threshold changeable secret sharing with secure secret reconstruction
From MaRDI portal
Publication:2296281
DOI10.1016/j.ipl.2020.105928zbMath1481.94146OpenAlexW3006443416MaRDI QIDQ2296281
Fuyou Miao, Wenchao Huang, Yan Xiong, Keju Meng
Publication date: 18 February 2020
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2020.105928
cryptographyunivariate polynomialbivariate symmetric polynomialillegal participant attackthreshold changeable secret sharing
Related Items
Randomized component based secure secret reconstruction in insecure networks ⋮ Multiparty verification in image secret sharing ⋮ Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities ⋮ Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient oblivious transfers with access control
- Lattice-based treshold-changeability for standard CRT secret-sharing schemes
- How to share a secret with cheaters
- On dealer-free dynamic threshold schemes
- A new threshold changeable secret sharing scheme based on the Chinese remainder theorem
- Security analysis of a dynamic threshold secret sharing scheme using linear subspace method
- Dynamic threshold secret reconstruction and its application to the threshold cryptography
- General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting
- Publicly Verifiable Secret Sharing
- How to share a secret
- Updating the Parameters of a Threshold Scheme by Minimal Broadcast
- Rational secret sharing and multiparty computation
- A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks
- Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience
- Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures
- How to Share a Secret
- A modular approach to key safeguarding
- Group Authentication
- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes