A Fast (3,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations

J Kurihara, S Kiyomoto, K Fukushima… - IEICE transactions on …, 2008 - search.ieice.org
In Shamir's (k, n)-threshold secret sharing scheme [1], a heavy computational cost is
required to make n shares and recover the secret from k shares. As a solution to this …

On a Fast (k,n)-Threshold Secret Sharing Scheme

J Kurihara, S Kiyomoto, K Fukushima… - IEICE Transactions on …, 2008 - search.ieice.org
In Shamir's (k, n)-threshold secret sharing scheme (threshold scheme)[1], a heavy
computational cost is required to make n shares and recover the secret from k shares. As a …

A New (k,n)-Threshold Secret Sharing Scheme and Its Extension

J Kurihara, S Kiyomoto, K Fukushima… - Information Security: 11th …, 2008 - Springer
In Shamir's (k, n)-threshold secret sharing scheme (threshold scheme), a heavy
computational cost is required to make n shares and recover the secret. As a solution to this …

A Fast (k,L,n)-Threshold Ramp Secret Sharing Scheme

J Kurihara, S Kiyomoto, K Fukushima… - IEICE Transactions on …, 2009 - search.ieice.org
Shamir's (k, n)-threshold secret sharing scheme (threshold scheme) has two problems: a
heavy computational cost is required to make shares and recover the secret, and a large …

New constructions of (2, n)-threshold secret sharing schemes using exclusive-or operations

Y Suga - 2013 Seventh International Conference on Innovative …, 2013 - ieeexplore.ieee.org
Fast (k, n)-threshold secret sharing schemes with exclusive-OR operations have proposed
by Kurihara et al. and Fujii et al. independently. Their method are ideal that share size is …

Linear (t, n) Secret Sharing Scheme with Reduced Number of Polynomials

KK Phiri, H Kim - Security and Communication Networks, 2019 - Wiley Online Library
Threshold secret sharing is concerned with the splitting of a secret into n shares and
distributing them to some persons without revealing its information. Any t≤ n persons …

Efficient secret sharing schemes

C Lv, X Jia, J Lin, J Jing, L Tian, M Sun - … June 28-30, 2011. Proceedings 8, 2011 - Springer
We propose a new XOR-based (k, n) threshold secret SSS, where the secret is a binary
string and only XOR operations are used to make shares and recover the secret. Moreover …

A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem

X Jia, D Wang, D Nie, X Luo, JZ Sun - Information sciences, 2019 - Elsevier
A general (t, n) secret sharing (SS) scheme with fixed threshold allows a secret to be shared
without considering the time dynamic nature of the security environment. In this paper, we …

Efficient ideal threshold secret sharing schemes based on exclusive-or operations

C Lv, X Jia, L Tian, J Jing, M Sun - 2010 Fourth International …, 2010 - ieeexplore.ieee.org
Most of secret sharing schemes have to be computed in a Galois field, such as Shamir's
scheme, which have relatively heavy computational cost. Kurihara et al. recently proposed a …

Fair (t, n) threshold secret sharing scheme

Y Tian, J Ma, C Peng, Q Jiang - IET Information Security, 2013 - Wiley Online Library
In the setting of secret sharing, a group of parties wish to run a protocol for recovering the
secret when they input their shares. The security requirement include privacy, correctness …