Y Liu, L Harn, CC Chang - International Journal of …, 2015 - Wiley Online Library
Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many applications of information security in recent years. A VSS enables a dealer to divide a …
Y Liu, CC Chang - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in the area of information security, such as for group authentication, cloud storage schemes …
OP Verma, N Jain, SK Pal - Arabian Journal for Science and Engineering, 2020 - Springer
It is not always in the best interests to rely on an individual to have control of entire sensitive information. This has led to the need for secret sharing schemes, which divide secret (key) …
K Kaya, AA Selçuk - Progress in Cryptology-INDOCRYPT 2008: 9th …, 2008 - Springer
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Chinese Remainder Theorem (CRT). We first show that two schemes proposed …
L Harn, C Lin - Information Sciences, 2010 - Elsevier
A (t, n) secret sharing divides a secret into n shares in such a way that any t or more than t shares can reconstruct the secret; but fewer than t shares cannot reconstruct the secret. In …
L Harn, C Lin, Y Li - Journal of Information Security and Applications, 2015 - Elsevier
In Shamir's (t, n) threshold secret sharing scheme, one secret s is divided into n shares by a dealer and all shares are shared among n shareholders, such that knowing t or more than t …
A Kanso, M Ghebleh - High-Confidence Computing, 2022 - Elsevier
This paper proposes a (t, n)–threshold verifiable secret sharing scheme with changeable parameters based on a trapdoor one-way function. This scheme consists of a generation …
L Harn - Security and communication networks, 2014 - Wiley Online Library
In Shamir's (t, n) secret sharing (SS) scheme, the secret s is divided into n shares by a dealer and is shared among n shareholders in such a way that any t or more than t shares can …
YX Liu, L Harn, CN Yang, YQ Zhang - Journal of Systems and Software, 2012 - Elsevier
Recently, Harn and Lin introduced a notion of strong t-consistency of a (t, n) secret sharing scheme and proposed a strong (n, t, n) verifiable secret sharing (VSS). In this paper, we …