Verifiable secret sharing based on the Chinese remainder theorem

L Harn, M Fuyou, CC Chang - Security and Communication …, 2014 - Wiley Online Library
ABSTRACT A (t, n) secret sharing scheme (SS) enables a dealer to divide a secret into n
shares in such a way that (i) the secret can be recovered successfully with t or more than t …

Verifiable secret sharing based on the Chinese remainder theorem

L Harn, M Fuyou, CC Chang - Security and Communication …, 2014 - search.proquest.com
A (t, n) secret sharing scheme (SS) enables a dealer to divide a secret into n shares in such
a way that (i) the secret can be recovered successfully with t or more than t shares, and (ii) …

[PDF][PDF] Verifiable secret sharing based on the Chinese remainder theorem

L Harn, M Fuyou, CC Chang - 2013 - staff.ustc.edu.cn
ABSTRACT A (t, n) secret sharing scheme (SS) enables a dealer to divide a secret into n
shares in such a way that (i) the secret can be recovered successfully with t or more than t …

Verifiable secret sharing based on the Chinese remainder theorem

L Harn, M Fuyou, CC Chang - Security and Communication Networks, 2014 - dl.acm.org
A t, n secret sharing scheme SS enables a dealer to divide a secret into n shares in such a
way that i the secret can be recovered successfully with t or more than t shares, and ii the …

Verifiable secret sharing based on the Chinese remainder theorem.

L Harn, M Fuyou, CC Chang - Security & Communication …, 2014 - search.ebscohost.com
ABSTRACT A (t, n) secret sharing scheme (SS) enables a dealer to divide a secret into n
shares in such a way that (i) the secret can be recovered successfully with t or more than t …