Verifiable secret sharing based on the Chinese remainder theorem

L Harn, M Fuyou, CC Chang - Security and Communication …, 2014 - Wiley Online Library
ABSTRACT A (t, n) secret sharing scheme (SS) enables a dealer to divide a secret into n
shares in such a way that (i) the secret can be recovered successfully with t or more than t …

A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets

Y Liu, L Harn, CC Chang - International Journal of …, 2015 - Wiley Online Library
Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many
applications of information security in recent years. A VSS enables a dealer to divide a …

[PDF][PDF] An Integratable Verifiable Secret Sharing Mechanism.

Y Liu, CC Chang - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in the
area of information security, such as for group authentication, cloud storage schemes …

A hybrid-based verifiable secret sharing scheme using Chinese remainder theorem

OP Verma, N Jain, SK Pal - Arabian Journal for Science and Engineering, 2020 - Springer
It is not always in the best interests to rely on an individual to have control of entire sensitive
information. This has led to the need for secret sharing schemes, which divide secret (key) …

A verifiable secret sharing scheme based on the chinese remainder theorem

K Kaya, AA Selçuk - Progress in Cryptology-INDOCRYPT 2008: 9th …, 2008 - Springer
In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by
using the Chinese Remainder Theorem (CRT). We first show that two schemes proposed …

Strong (n, t, n) verifiable secret sharing scheme

L Harn, C Lin - Information Sciences, 2010 - Elsevier
A (t, n) secret sharing divides a secret into n shares in such a way that any t or more than t
shares can reconstruct the secret; but fewer than t shares cannot reconstruct the secret. In …

Fair secret reconstruction in (t, n) secret sharing

L Harn, C Lin, Y Li - Journal of Information Security and Applications, 2015 - Elsevier
In Shamir's (t, n) threshold secret sharing scheme, one secret s is divided into n shares by a
dealer and all shares are shared among n shareholders, such that knowing t or more than t …

[HTML][HTML] A trapdoor one-way function for verifiable secret sharing

A Kanso, M Ghebleh - High-Confidence Computing, 2022 - Elsevier
This paper proposes a (t, n)–threshold verifiable secret sharing scheme with changeable
parameters based on a trapdoor one-way function. This scheme consists of a generation …

Secure secret reconstruction and multi‐secret sharing schemes with unconditional security

L Harn - Security and communication networks, 2014 - Wiley Online Library
In Shamir's (t, n) secret sharing (SS) scheme, the secret s is divided into n shares by a dealer
and is shared among n shareholders in such a way that any t or more than t shares can …

Efficient (n, t, n) secret sharing schemes

YX Liu, L Harn, CN Yang, YQ Zhang - Journal of Systems and Software, 2012 - Elsevier
Recently, Harn and Lin introduced a notion of strong t-consistency of a (t, n) secret sharing
scheme and proposed a strong (n, t, n) verifiable secret sharing (VSS). In this paper, we …