Multilevel threshold secret sharing based on the Chinese remainder theorem
From MaRDI portal
Publication:2448863
DOI10.1016/j.ipl.2014.04.006zbMath1302.94052MaRDI QIDQ2448863
Publication date: 5 May 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2014.04.006
cryptography; Chinese remainder theorem; threshold value; Asmuth-Bloom secret-sharing scheme; multilevel secret sharing; multilevel secret-sharing scheme
11T71: Algebraic coding theory; cryptography (number-theoretic aspects)
94A60: Cryptography
94A62: Authentication, digital signatures and secret sharing
Cites Work
- How to share a secret
- A method for obtaining digital signatures and public-key cryptosystems
- Advanced Topics in Computional Number Theory
- How to Share a Secret
- A modular approach to key safeguarding
- A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item