Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

Blockchain technology for information security of the energy internet: Fundamentals, features, strategy and application

Z Zeng, Y Li, Y Cao, Y Zhao, J Zhong, D Sidorov… - Energies, 2020 - mdpi.com
In order to ensure the information security, most of the important information including the
data of advanced metering infrastructure (AMI) in the energy internet is currently transmitted …

Threshold signatures from inner product argument: Succinct, weighted, and multi-threshold

S Das, P Camacho, Z Xiang, J Nieto, B Bünz… - Proceedings of the 2023 …, 2023 - dl.acm.org
Threshold signatures protect the signing key by sharing it among a group of signers so that
an adversary must corrupt a threshold number of signers to be able to forge signatures …

Fair hierarchical secret sharing scheme based on smart contract

E Zhang, M Li, SM Yiu, J Du, JZ Zhu, GG Jin - Information Sciences, 2021 - Elsevier
Secret sharing has a number of practical applications in network-based scenarios, such as
key transfer protocols, attribute-based encryption and secure multiparty computation …

A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations

J Yuan, J Yang, C Wang, X Jia, FW Fu, G Xu - Information Sciences, 2022 - Elsevier
Hierarchical secret sharing is an important key management technique since it is specially
customized for hierarchical organizations with different departments allocated with different …

[PDF][PDF] Weighted secret sharing from wiretap channels

F Benhamouda, S Halevi… - 4th Conference on …, 2023 - drops.dagstuhl.de
Secret-sharing allows splitting a piece of secret information among a group of shareholders,
so that it takes a large enough subset of them to recover it. In weighted secret-sharing, each …

Ideal multipartite secret sharing schemes

O Farràs, J Martí-Farré, C Padró - Journal of cryptology, 2012 - Springer
Multipartite secret sharing schemes are those having a multipartite access structure, in
which the set of participants is divided into several parts and all participants in the same part …

Dynamic hierarchical quantum secret sharing based on the multiscale entanglement renormalization ansatz

H Lai, J Pieprzyk, L Pan - Physical Review A, 2022 - APS
Tensor networks offer a novel and powerful tool for solving a variety of problems in
mathematics, data science, and engineering. One such network is the multiscale …

Natural generalizations of threshold secret sharing

O Farras, C Padró, C Xing… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
We present new families of access structures that, similarly to the multilevel and
compartmented access structures introduced in previous works, are natural generalizations …

A novel group key transfer for big data security

C Hsu, B Zeng, M Zhang - Applied Mathematics and Computation, 2014 - Elsevier
With the rapid development of group-oriented services over big data, it needs novel
solutions to ensure big data security. Most existing group key transfer protocols depend on a …