Constructing ideal secret sharing schemes based on Chinese remainder theorem

Y Ning, F Miao, W Huang, K Meng, Y Xiong… - … Conference on the …, 2018 - Springer
Abstract Since (t, n)-threshold secret sharing (SS) was initially proposed by Shamir and
Blakley separately in 1979, it has been widely used in many aspects. Later on, Asmuth and …

On the asymptotic idealness of the Asmuth-Bloom threshold secret sharing scheme

CC Drăgan, FL Tiplea - Information Sciences, 2018 - Elsevier
The Chinese remainder theorem (CRT) is a fundamental theorem in number theory, widely
used in cryptography to design secret sharing schemes. The CRT-based secret sharing …

A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor

L Wu, F Miao, K Meng, X Wang - Frontiers of Computer Science, 2022 - Springer
Secret sharing (SS) is part of the essential techniques in cryptography but still faces many
challenges in efficiency and security. Currently, SS schemes based on the Chinese …

Multilevel threshold secret sharing based on the Chinese Remainder Theorem

L Harn, M Fuyou - Information processing letters, 2014 - Elsevier
The (t, n) threshold secret sharing schemes (SSs) were introduced by Shamir and Blakley
separately in 1979. Multilevel threshold secret sharing (MTSS) is a generalization of …

A Fast (3,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations

J Kurihara, S Kiyomoto, K Fukushima… - IEICE transactions on …, 2008 - search.ieice.org
In Shamir's (k, n)-threshold secret sharing scheme [1], a heavy computational cost is
required to make n shares and recover the secret from k shares. As a solution to this …

A New (k,n)-Threshold Secret Sharing Scheme and Its Extension

J Kurihara, S Kiyomoto, K Fukushima… - Information Security: 11th …, 2008 - Springer
In Shamir's (k, n)-threshold secret sharing scheme (threshold scheme), a heavy
computational cost is required to make n shares and recover the secret. As a solution to this …

On a Fast (k,n)-Threshold Secret Sharing Scheme

J Kurihara, S Kiyomoto, K Fukushima… - IEICE Transactions on …, 2008 - search.ieice.org
In Shamir's (k, n)-threshold secret sharing scheme (threshold scheme)[1], a heavy
computational cost is required to make n shares and recover the secret from k shares. As a …

A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem

X Jia, D Wang, D Nie, X Luo, JZ Sun - Information sciences, 2019 - Elsevier
A general (t, n) secret sharing (SS) scheme with fixed threshold allows a secret to be shared
without considering the time dynamic nature of the security environment. In this paper, we …

Linear (t, n) Secret Sharing Scheme with Reduced Number of Polynomials

KK Phiri, H Kim - Security and Communication Networks, 2019 - Wiley Online Library
Threshold secret sharing is concerned with the splitting of a secret into n shares and
distributing them to some persons without revealing its information. Any t≤ n persons …

[PDF][PDF] A multi-secret sharing scheme based on the CRT and RSA

X Dong - International Journal of Electronics and Information …, 2015 - ijeie.jalaxy.com.tw
In this paper, we propose to enhance threshold secret sharing schemes based on the
Chinese remainder theorem (CRT) by incorporating the well-known RSA Cryptosystem. In …