As a basic tool, Verifiable Secret Sharing (VSS) has wide applications in distributed cryptosystems as well as secure multi-party computations. A number of VSS schemes for …
Y Jiang, Y Zhu, J Wang, X Li - Frontiers of Computer Science, 2023 - Springer
Identity-based threshold signature (IDTS) is a forceful primitive to protect identity and data privacy, in which parties can collaboratively sign a given message as a signer without …
VP Binu, A Sreekumar - Wireless Personal Communications, 2017 - Springer
Secret sharing techniques allow a secret to be shared among n participants in such a way that a specified subset of participant can reconstruct the secret by combining their shares …
Secret Sharing techniques are now the building blocks of several security protocols. A (t; n) threshold secret sharing scheme is one in which t or more participant can join together to …
S Mashhadi - Information Security Journal: A Global Perspective, 2023 - Taylor & Francis
In a verifiable secret sharing (VSS) scheme, each participant can check cheating by the dealer or the other participants. In this work, we construct a VSS scheme with the strongest …
W Yang, W Luo, X Luo, J Weng… - Science China …, 2018 - scis.scichina.com
A certificateless (t, n) threshold signature (CLTS) scheme allows at least t members to cooperatively sign a message on behalf of an n-member group, which is a good way to …
This dissertation deals with the development of secret sharing schemes with several extended capabilities and also their applications. We have considered schemes with single …