Sequential Secret Sharing Scheme Based on Chinese Remainder Theorem (original) (raw)
Related papers
IET Information Security, 2021
Weighted threshold secret sharing based on the Chinese remainder theorem
2005
Multi-stage Multi-secret Sharing Scheme for Hierarchical Access Structure
Multilevel Threshold Secret Image Sharing based on the Chinese Remainder Theorem
2016
Sequential Secret Sharing Scheme Based on Level Ordered Access Structure
Int. J. Netw. Secur., 2016
Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT
Journal of Communications Software and Systems, 2015
Sequential (t,n) multi secret sharing scheme for level-ordered access structure
International Journal of Information Technology, 2018
On construction of cumulative secret sharing schemes
Lecture Notes in Computer Science, 1998
An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem
International Journal of Computer Mathematics, 2017
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem
The ISC International Journal of Information Security, 2023
CRT based multi-secret sharing schemes: revisited
International Journal of Security and Networks, 2018
Secret sharing system using (k, L, n) threshold scheme
Electronics and Communications in Japan (Part I: Communications), 1986
Consideration for multi-threshold multi-secret sharing schemes
International Symposium on Information Theory and Applications (ISITA 2012)
An improved secret sharing scheme based on ( K,N ) threshold
International Journal Foundation
Advance Research Journal of Multidisciplinary Discoveries, 2019
Study on the Parameters of Secret Sharing Scheme
Lecture Notes in Computer Science, 1994
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension
Sakibur Rahman, Shinsaku Kiyomoto
An ideal hierarchical secret sharing scheme
ArXiv, 2020
A Note on Multiple Secret Sharing Using Chinese Remainder Theorem and Exclusive-OR
IEEE Access
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters
Lecture Notes in Computer Science
New secret sharing scheme for multipartite access structures with threshold changeability
2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015
An Explication of Secret Sharing Schemes with General Access Structure
2013
Secret sharing scheme realizing general access structure
Electronics and Communications in Japan (Part III: Fundamental Electronic Science)
An efficient rational secret sharing scheme based on the Chinese remainder theorem
2011
An efficient multi-use multi-secret sharing scheme
Proceedings of National Workshop on Cryptology, 2009, SVNIT Surat, 2009
Multisecret-sharing scheme with two-level security and its applications in Blockchain
Cornell University - arXiv, 2022
Threshold Multi-Secret Sharing Scheme for Cheat-Proof among Weighted Participants
2009 Second International Symposium on Electronic Commerce and Security, 2009
IACR Cryptology ePrint Archive, 2018
A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure
Wireless Personal Communications, 2018
An efficient threshold verifiable multi-secret sharing
Computer Standards & Interfaces, 2008
An Efficient Threshold Secret Sharing Scheme Using Fast Fourier Transform
International Journal of Smart Sensor and Adhoc Network., 2022
Compounding secret sharing schemes
A New Approach to Weighted Multi-Secret Sharing
2011
On secret sharing schemes with extended capabilities
2002
Analyzing Extended Secret Sharing Schemes based on Share Size
International Journal of Computer Applications, 2015