A New (k,n)-Threshold Secret Sharing Scheme and Its Extension

J Kurihara, S Kiyomoto, K Fukushima… - Information Security: 11th …, 2008 - Springer
In Shamir's (k, n)-threshold secret sharing scheme (threshold scheme), a heavy
computational cost is required to make n shares and recover the secret. As a solution to this …

On a Fast (k,n)-Threshold Secret Sharing Scheme

J Kurihara, S Kiyomoto, K Fukushima… - IEICE Transactions on …, 2008 - search.ieice.org
In Shamir's (k, n)-threshold secret sharing scheme (threshold scheme)[1], a heavy
computational cost is required to make n shares and recover the secret from k shares. As a …

A Fast (3,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations

J Kurihara, S Kiyomoto, K Fukushima… - IEICE transactions on …, 2008 - search.ieice.org
In Shamir's (k, n)-threshold secret sharing scheme [1], a heavy computational cost is
required to make n shares and recover the secret from k shares. As a solution to this …

A Fast (k,L,n)-Threshold Ramp Secret Sharing Scheme

J Kurihara, S Kiyomoto, K Fukushima… - IEICE Transactions on …, 2009 - search.ieice.org
Shamir's (k, n)-threshold secret sharing scheme (threshold scheme) has two problems: a
heavy computational cost is required to make shares and recover the secret, and a large …

Weighted threshold secret sharing based on the Chinese remainder theorem

S Iftene, IC Boureanu - Scientific Annals of Cuza University, 2005 - infoscience.epfl.ch
A secret sharing scheme derives from a given secret certain shares (or shadows) which are
distributed to users. The secret can be recovered only by certain predetermined groups. In …

Fair (t, n) threshold secret sharing scheme

Y Tian, J Ma, C Peng, Q Jiang - IET Information Security, 2013 - Wiley Online Library
In the setting of secret sharing, a group of parties wish to run a protocol for recovering the
secret when they input their shares. The security requirement include privacy, correctness …

Ideal perfect multilevel threshold secret sharing scheme

C Lin, L Harn, D Ye - 2009 Fifth International Conference on …, 2009 - ieeexplore.ieee.org
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal
and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme …

A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem

X Jia, D Wang, D Nie, X Luo, JZ Sun - Information sciences, 2019 - Elsevier
A general (t, n) secret sharing (SS) scheme with fixed threshold allows a secret to be shared
without considering the time dynamic nature of the security environment. In this paper, we …

Secret sharing with secure secret reconstruction

L Harn, Z Xia, C Hsu, Y Liu - Information Sciences, 2020 - Elsevier
Threshold secret sharing is a fundamental building block in information security to provide
secrecy and robustness services for various cryptographic protocols. According to the …

Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …