[HTML][HTML] Defensive strategies against PCC attacks based on ideal (t, n)-secret sharing scheme

S Ali, J Wang, VCM Leung - Journal of King Saud University-Computer and …, 2023 - Elsevier
We present a method to increase the dependability of cloud-based applications. Traditional
Secret Sharing Schemes (SSSs) typically fail to counter the challenges brought on by …

Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications

J Zhang, F Zhang - Future Generation Computer Systems, 2015 - Elsevier
As a basic tool, Verifiable Secret Sharing (VSS) has wide applications in distributed
cryptosystems as well as secure multi-party computations. A number of VSS schemes for …

Fully distributed identity-based threshold signatures with identifiable aborts

Y Jiang, Y Zhu, J Wang, X Li - Frontiers of Computer Science, 2023 - Springer
Identity-based threshold signature (IDTS) is a forceful primitive to protect identity and data
privacy, in which parties can collaboratively sign a given message as a signer without …

Secure and efficient secret sharing scheme with general access structures based on elliptic curve and pairing

VP Binu, A Sreekumar - Wireless Personal Communications, 2017 - Springer
Secret sharing techniques allow a secret to be shared among n participants in such a way
that a specified subset of participant can reconstruct the secret by combining their shares …

Threshold multi secret sharing using elliptic curve and pairing

VP Binu, A Sreekumar - arXiv preprint arXiv:1603.09524, 2016 - arxiv.org
Secret Sharing techniques are now the building blocks of several security protocols. A (t; n)
threshold secret sharing scheme is one in which t or more participant can join together to …

Game-based security proofs for verifiable secret sharing schemes in the standard model

S Mashhadi - Information Security Journal: A Global Perspective, 2023 - Taylor & Francis
In a verifiable secret sharing (VSS) scheme, each participant can check cheating by the
dealer or the other participants. In this work, we construct a VSS scheme with the strongest …

[PDF][PDF] 抗隐蔽敌手的云外包秘密共享方案

张恩, 耿魁, 金伟, 李勇俊, 孙韵清… - Journal on …, 2017 - 221.179.172.81
为了促使计算能力薄弱的云租户有效及公平地重构秘密, 结合云外包计算和秘密共享特性,
提出一种云外包秘密共享方案. 在云外包秘密共享过程中, 云租户间无需交互 …

[PDF][PDF] Fully distributed certificateless threshold signature without random oracles

W Yang, W Luo, X Luo, J Weng… - Science China …, 2018 - scis.scichina.com
A certificateless (t, n) threshold signature (CLTS) scheme allows at least t members to
cooperatively sign a message on behalf of an n-member group, which is a good way to …

[PDF][PDF] Secret Sharing Schemes with Extended Capabilities and Applications

VP Binu, A Sreekumar - 2016 - events.cusat.ac.in
This dissertation deals with the development of secret sharing schemes with several
extended capabilities and also their applications. We have considered schemes with single …

[PDF][PDF] 强抗泄漏的无条件安全动态秘密共享方案

张明武, 陈泌文, 李发根, 蒋亚军HARN - 密码学报, 2016 - jcr.cacrnet.org.cn
(t, n) 门限秘密共享中, 分发者将秘密S 分成n 个秘密份额, 使得任意不少于t
个秘密份额可以成功重构秘密S, 而小于门限t 的秘密份额无法获得有关秘密的任何信息 …