S Dolev, Y Kleinman - 2022 IEEE 21st International …, 2022 - ieeexplore.ieee.org
A new CRT-based positive (non-zero) secret-sharing scheme with perfect information- theoretic (PIT) security and multiplicative homomorphism is presented. The scheme is …
O Ersoy, TB Pedersen, E Anarim - Discrete Applied Mathematics, 2020 - Elsevier
In this work, we explore the homomorphic aspect of CRT-based secret sharing schemes. Secret sharing homomorphism is the notion of operating on multiple secrets by direct …
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of …
O Barkol, Y Ishai, E Weinreb - Journal of cryptology, 2010 - Springer
A multiplicative secret sharing scheme allows players to multiply two secret-shared field elements by locally converting their shares of the two secrets into an additive sharing of their …
M Andrecut - arXiv preprint arXiv:2302.02507, 2023 - arxiv.org
We propose an adaptive threshold multi secret sharing scheme based solely on cryptographically secure hash functions. We show that the proposed scheme is also: perfect …
R Thorbek - Cryptology ePrint Archive, 2009 - eprint.iacr.org
Proactive Linear Integer Secret Sharing Page 1 Proactive Linear Integer Secret Sharing Rune Thorbek BRICS, Dept. of Computer Science, University of Aarhus Abstract. In [3] Damgard …
L Yuan, M Li, C Guo, KKR Choo, Y Ren - PloS one, 2016 - journals.plos.org
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy …
The emergence of ubiquitous computing and different disruptive technologies caused magnificent development in information and communication technology. Likewise …
Y Wang, Y Desmedt - 2014 IEEE Information Theory Workshop …, 2014 - ieeexplore.ieee.org
One of the important problems in secret sharing schemes is to establish bounds on the size of the shares to be given to participants in secret sharing schemes. The other important …