How to Share a Secret

From MaRDI portal
Publication:5120696

DOI10.1007/3-540-39466-4_27zbMath1447.94064OpenAlexW1484820633WikidataQ27915506 ScholiaQ27915506MaRDI QIDQ5120696

Maurice Mignotte

Publication date: 15 September 2020

Published in: Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-39466-4_27




Related Items (31)

ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher callsAn asymptotically perfect secret sharing scheme based on the Chinese Remainder TheoremUnnamed ItemA collaborative secret sharing scheme based on the Chinese remainder theoremDistributive weighted threshold secret sharing schemesA verifiable framework of entanglement-free quantum secret sharing with information-theoretical securityA secure and efficient on-line/off-line group key distribution protocolA perfect secret sharing scheme for general access structuresHomomorphic extensions of CRT-based secret sharingOn the asymptotic idealness of the Asmuth-Bloom threshold secret sharing schemeCryptography with weights: MPC, encryption and signaturesBivariate polynomial-based secret sharing schemes with secure secret reconstructionA new threshold changeable secret sharing scheme based on the Chinese remainder theoremSelected application of the Chinese remainder theorem in multiparty computationConstructing ideal secret sharing schemes based on Chinese remainder theoremA necessary and sufficient condition for the asymptotic idealness of the GRS threshold secret sharing schemeMultilevel threshold secret sharing based on the Chinese remainder theoremSecret sharing schemes for infinite sets of participants: a new design techniqueThreshold quantum secret sharing based on single qubitVerifiable threshold quantum secret sharing with sequential communicationNon-admissible tracks in Shamirs schemeElementary symmetric polynomials in Shamir's schemeTightly coupled multi-group threshold secret sharing based on Chinese remainder theoremRealizing secret sharing with general access structureLattice-based treshold-changeability for standard CRT secret-sharing schemesThreshold changeable secret sharing with secure secret reconstructionAn Ideal and Perfect (t, n) Multi-secret Sharing Scheme Based on Finite GeometryChinese remainder theorem-based secret image sharing with small-sized shadow imagesGeneralized Mignotte's Sequences Over Polynomial RingsGeneral Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-VotingDynamic threshold secret reconstruction and its application to the threshold cryptography







This page was built for publication: How to Share a Secret