A modular approach to key safeguarding

From MaRDI portal
Publication:5120697

DOI10.1109/TIT.1983.1056651zbMath1447.94018WikidataQ27915587 ScholiaQ27915587MaRDI QIDQ5120697

C. Asmuth, John R. Bloom

Publication date: 15 September 2020

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)




Related Items (43)

ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher callsAn asymptotically perfect secret sharing scheme based on the Chinese Remainder TheoremThreshold cryptography based on Asmuth-Bloom secret sharingUnnamed ItemRandomized component based secure secret reconstruction in insecure networksOn ASGS framework: general requirements and an example of implementationA collaborative secret sharing scheme based on the Chinese remainder theoremRamp secret image sharingDistributive weighted threshold secret sharing schemesA verifiable framework of entanglement-free quantum secret sharing with information-theoretical securityA secure and efficient on-line/off-line group key distribution protocolOptimal codes from Fibonacci polynomials and secret sharing schemesRobust Threshold Schemes Based on the Chinese Remainder TheoremA perfect secret sharing scheme for general access structuresRevisiting group oriented secret sharing schemesHomomorphic extensions of CRT-based secret sharingOn the asymptotic idealness of the Asmuth-Bloom threshold secret sharing schemeCryptography with weights: MPC, encryption and signaturesBivariate polynomial-based secret sharing schemes with secure secret reconstructionA new threshold changeable secret sharing scheme based on the Chinese remainder theoremRamp scheme based on CRT for polynomial ring over finite fieldConstructing ideal secret sharing schemes based on Chinese remainder theoremA necessary and sufficient condition for the asymptotic idealness of the GRS threshold secret sharing schemeMultilevel threshold secret sharing based on the Chinese remainder theoremCompact sequences of co-primes and their applications to the security of CRT-based threshold schemesA Lossless Linear Algebraic Secret Image Sharing SchemeA new secret sharing schemeThreshold quantum secret sharing based on single qubitVerifiable threshold quantum secret sharing with sequential communicationFinding the maximal adversary structure from any given access structureNon-admissible tracks in Shamirs schemeElementary symmetric polynomials in Shamir's schemeTightly coupled multi-group threshold secret sharing based on Chinese remainder theoremContinuous variable quantum secret sharing with Chinese remainder theoremRealizing secret sharing with general access structureLattice-based treshold-changeability for standard CRT secret-sharing schemesThreshold changeable secret sharing with secure secret reconstructionChinese remainder theorem-based secret image sharing with small-sized shadow imagesA rational threshold signature model and protocol based on different permissionsGeneralized Mignotte's Sequences Over Polynomial RingsGeneral Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-VotingSharing DSS by the Chinese remainder theoremDynamic threshold secret reconstruction and its application to the threshold cryptography




This page was built for publication: A modular approach to key safeguarding