Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

An attribute-based controlled collaborative access control scheme for public cloud storage

Y Xue, K Xue, N Gai, J Hong, DSL Wei… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In public cloud storage services, data are outsourced to semi-trusted cloud servers which
are outside of data owners' trusted domain. To prevent untrustworthy service providers from …

Cryptography with weights: MPC, encryption and signatures

S Garg, A Jain, P Mukherjee, R Sinha, M Wang… - Annual International …, 2023 - Springer
The security of many powerful cryptographic systems such as secure multiparty computation,
threshold encryption, and threshold signatures rests on trust assumptions about the parties …

Secret sharing for cloud data security: a survey

V Attasena, J Darmont, N Harbi - The VLDB Journal, 2017 - Springer
Cloud computing helps reduce costs, increase business agility and deploy solutions with a
high return on investment for many types of applications. However, data security is of …

[PDF][PDF] A weighted threshold secret sharing scheme for remote sensing images based on Chinese remainder theorem

Q He, S Yu, H Xu, J Liu, D Huang… - Comput. Mater …, 2019 - pdfs.semanticscholar.org
The recent advances in remote sensing and computer techniques give birth to the explosive
growth of remote sensing images. The emergence of cloud storage has brought new …

Distributive weighted threshold secret sharing schemes

CC Drăgan, FL Ţiplea - Information sciences, 2016 - Elsevier
The concept of distributive weighted threshold access structure is introduced, which is an
weighted threshold access structure where the participants are distributed on levels, the …

Mingyuan Wang5, and Yinuo Zhang5 1 ¹ UC Berkeley and NTT Research, Berkeley, USA sanjamg@ berkeley. edu 2 John Hopkins University, Baltimore, USA

S Garg¹, A Jain, P Mukherjee… - Advances in Cryptology …, 2023 - books.google.com
The security of many powerful cryptographic systems such as secure multiparty computation,
threshold encryption, and threshold signatures rests on trust assumptions about the parties …

Ramp scheme based on CRT for polynomial ring over finite field

J Ding, P Ke, C Lin, H Wang - Journal of Systems Science and Complexity, 2023 - Springer
Abstract Chinese Reminder Theorem (CRT) for integers has been widely used to construct
secret sharing schemes for different scenarios, but these schemes have lower information …

A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem

H Chen, CC Chang - Security and Communication Networks, 2019 - Wiley Online Library
The (t, n) secret sharing scheme is used to protect the privacy of information by distribution.
More specifically, a dealer splits a secret into n shares and distributes them privately to n …

Новый метод порогового разделения секрета, основанный на системе остаточных классов

НИ Червяков, МА Дерябин - Информационные технологии, 2016 - elibrary.ru
Рассмотрены основные принципы построения схем разделения секрета на основе
системы остаточных классов. На основе анализа абсолютной и вычислительной …