Dynamic threshold secret reconstruction and its application to the threshold cryptography
From MaRDI portal
Publication:2353654
DOI10.1016/J.IPL.2015.06.014zbMATH Open1333.94037OpenAlexW1194807963MaRDI QIDQ2353654FDOQ2353654
Authors: Lein Harn, Chingfang Hsu
Publication date: 15 July 2015
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2015.06.014
Recommendations
Cites Work
- Title not available (Why is that?)
- A method for obtaining digital signatures and public-key cryptosystems
- How to share a secret
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Title not available (Why is that?)
- How to share a function securely
- How to share a secret with cheaters
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Practical threshold signatures
- Robust and efficient sharing of RSA functions
- Title not available (Why is that?)
- Publicly verifiable secret sharing
- The Round Complexity of Verifiable Secret Sharing Revisited
- The round complexity of verifiable secret sharing and secure multicast
- Theory of Cryptography
- A modular approach to key safeguarding
- Detection and identification of cheaters in \((t,n)\) secret sharing scheme
- Title not available (Why is that?)
- Group-oriented (t, n) threshold digital signature scheme and digital multisignature
- How to share a secret
- Efficient statistical asynchronous verifiable secret sharing with optimal resilience
- Improving the Round Complexity of VSS in Point-to-Point Networks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
- Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
- Threshold changeable secret sharing schemes revisited
- Title not available (Why is that?)
- Lattice-based treshold-changeability for standard CRT secret-sharing schemes
- Shared secret reconstruction
- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
- On dealer-free dynamic threshold schemes
- The round complexity of verifiable secret sharing: the statistical case
- Selected Areas in Cryptography
- Title not available (Why is that?)
- One-round ID-based threshold signature scheme from bilinear pairings
Cited In (16)
- A pseudo dynamic threshold scheme
- On dynamic threshold schemes
- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
- Analysis on a dynamic \( (t,n)\) threshold multi-secret sharing scheme
- Randomized component based secure secret reconstruction in insecure networks
- Security analysis of a dynamic threshold secret sharing scheme using linear subspace method
- Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
- Secret sharing with secure secret reconstruction
- Title not available (Why is that?)
- Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities
- Dynamic threshold secret sharing scheme
- Information Security and Privacy
- On dealer-free dynamic threshold schemes
- Ramp scheme based on CRT for polynomial ring over finite field
- A new threshold changeable secret sharing scheme based on the Chinese remainder theorem
- Threshold changeable secret sharing with secure secret reconstruction
This page was built for publication: Dynamic threshold secret reconstruction and its application to the threshold cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2353654)