Sequential Secret Sharing Scheme Based on Chinese Remainder Theorem (original) (raw)

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

Ferucio Laurentiu Tiplea

IET Information Security, 2021

View PDFchevron_right

Weighted threshold secret sharing based on the Chinese remainder theorem

Ioana Boureanu

2005

View PDFchevron_right

Multi-stage Multi-secret Sharing Scheme for Hierarchical Access Structure

Abdul Basit

View PDFchevron_right

Multilevel Threshold Secret Image Sharing based on the Chinese Remainder Theorem

Rosemary Koikara

2016

View PDFchevron_right

Sequential Secret Sharing Scheme Based on Level Ordered Access Structure

Appala Tentu

Int. J. Netw. Secur., 2016

View PDFchevron_right

Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT

Anjaneyulu Endurthi

Journal of Communications Software and Systems, 2015

View PDFchevron_right

Sequential (t,n) multi secret sharing scheme for level-ordered access structure

Appala Tentu

International Journal of Information Technology, 2018

View PDFchevron_right

On construction of cumulative secret sharing schemes

Huaxiong Wang

Lecture Notes in Computer Science, 1998

View PDFchevron_right

An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem

Randy Liu

International Journal of Computer Mathematics, 2017

View PDFchevron_right

A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem

ISECURE Journal

The ISC International Journal of Information Security, 2023

View PDFchevron_right

CRT based multi-secret sharing schemes: revisited

Appala Tentu

International Journal of Security and Networks, 2018

View PDFchevron_right

Secret sharing system using (k, L, n) threshold scheme

Hirosuke Yamamoto

Electronics and Communications in Japan (Part I: Communications), 1986

View PDFchevron_right

Consideration for multi-threshold multi-secret sharing schemes

Masakazu Soshi

International Symposium on Information Theory and Applications (ISITA 2012)

View PDFchevron_right

An improved secret sharing scheme based on ( K,N ) threshold

International Journal Foundation

Advance Research Journal of Multidisciplinary Discoveries, 2019

View PDFchevron_right

Study on the Parameters of Secret Sharing Scheme

Sougata Chakraborty

View PDFchevron_right

Multi-Secret Sharing Schemes

Giovanni Di Crescenzo

Lecture Notes in Computer Science, 1994

View PDFchevron_right

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension

Sakibur Rahman, Shinsaku Kiyomoto

View PDFchevron_right

An ideal hierarchical secret sharing scheme

BOUROUBI sadek

ArXiv, 2020

View PDFchevron_right

A Note on Multiple Secret Sharing Using Chinese Remainder Theorem and Exclusive-OR

Heri Prasetyo

IEEE Access

View PDFchevron_right

Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters

Kirill Morozov

Lecture Notes in Computer Science

View PDFchevron_right

New secret sharing scheme for multipartite access structures with threshold changeability

Appala Tentu

2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015

View PDFchevron_right

An Explication of Secret Sharing Schemes with General Access Structure

Kapil Tajane

2013

View PDFchevron_right

Secret sharing scheme realizing general access structure

Takao Nishizeki

Electronics and Communications in Japan (Part III: Fundamental Electronic Science)

View PDFchevron_right

An efficient rational secret sharing scheme based on the Chinese remainder theorem

Huaxiong Wang

2011

View PDFchevron_right

An efficient multi-use multi-secret sharing scheme

Angsuman Das

Proceedings of National Workshop on Cryptology, 2009, SVNIT Surat, 2009

View PDFchevron_right

Multisecret-sharing scheme with two-level security and its applications in Blockchain

Ritumoni Sarma

Cornell University - arXiv, 2022

View PDFchevron_right

Threshold Multi-Secret Sharing Scheme for Cheat-Proof among Weighted Participants

gao yan

2009 Second International Symposium on Electronic Commerce and Security, 2009

View PDFchevron_right

Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures

Ferucio Laurentiu Tiplea

IACR Cryptology ePrint Archive, 2018

View PDFchevron_right

A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure

Massoud Hadian Dehkordi

Wireless Personal Communications, 2018

View PDFchevron_right

An efficient threshold verifiable multi-secret sharing

Massoud Hadian Dehkordi

Computer Standards & Interfaces, 2008

View PDFchevron_right

An Efficient Threshold Secret Sharing Scheme Using Fast Fourier Transform

Vanashree Gupta

International Journal of Smart Sensor and Adhoc Network., 2022

View PDFchevron_right

Compounding secret sharing schemes

Edgar Martinez-Moro

View PDFchevron_right

A New Approach to Weighted Multi-Secret Sharing

Elisa Bertino

2011

View PDFchevron_right

On secret sharing schemes with extended capabilities

Zbigniew Kotulski

2002

View PDFchevron_right

Analyzing Extended Secret Sharing Schemes based on Share Size

SONALI PATIL

International Journal of Computer Applications, 2015

View PDFchevron_right