Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem
From MaRDI portal
Publication:526653
DOI10.1016/j.ins.2014.08.046zbMath1360.94323OpenAlexW2042098128MaRDI QIDQ526653
Massoud Hadian Dehkordi, Samaneh Mashhadi
Publication date: 15 May 2017
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.08.046
verifiable secret sharingLFSR public-key cryptosystemnonhomogeneous linear recursionpublic valuesecure channel
Related Items (9)
An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem ⋮ A non-interactive \((t, n)\)-publicly verifiable multi-secret sharing scheme ⋮ New multi-stage secret sharing in the standard model ⋮ A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations ⋮ A fully dynamic secret sharing scheme ⋮ A verifiable threshold secret sharing scheme based on lattices ⋮ Tightly coupled multi-group threshold secret sharing based on Chinese remainder theorem ⋮ Realizing secret sharing with general access structure ⋮ New \((k,l,m)\)-verifiable multi-secret sharing schemes based on XTR public key system
Cites Work
- Unnamed Item
- Unnamed Item
- Verifiable multi-secret sharing based on LFSR sequences
- A verifiable multi-secret sharing scheme based on cellular automata
- Strong \((n, t, n)\) verifiable secret sharing scheme
- A \((t,n)\) multi-secret sharing scheme
- A multiple-level visual secret-sharing scheme without image size expansion
- New efficient and practical verifiable multi-secret sharing schemes
- A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing
- A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme
- How to share a secret
- Public-key cryptosystems based on cubic finite field extensions
This page was built for publication: Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem