An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection

S Krenn, T Lorünser - 2023 - books.google.com
This book provides an introduction to secret sharing, a key technology for practical
applications and higher-level cryptographic protocols. This survey analyzes existing work …

CRT based multi-secret sharing schemes: revisited

AN Tentu, VC Venkaiah… - International Journal of …, 2018 - inderscienceonline.com
Secret sharing is a cryptographic primitive, which is used to distribute a secret among a set
of participants in such a way that an authorised subset of participants can uniquely …

Computationally perfect compartmented secret sharing schemes based on MDS codes

AN Tentu, P Paul, VC Venkaiah - International Journal of …, 2014 - inderscienceonline.com
Two compartmented secret sharing schemes are proposed in this paper. Constructions of
the proposed schemes are based on the maximum distance separable (MDS) codes. One of …

FlexHi: A Flexible Hierarchical Threshold Signature Scheme

MA Bingol, S Kocaman, A Dogan, SK Toplu - Science and Information …, 2024 - Springer
Threshold signature schemes have gained prominence in enhancing the security and
flexibility of digital signatures, allowing a group of participants to collaboratively create …

[HTML][HTML] 基于LCD 码的可验证多秘密共享方案

张玲玲, 胡慧丹, 林昌露 - Advances in Applied Mathematics, 2024 - hanspub.org
为了解决基于线性码的秘密共享在区块链数据隐私保护中容易受到Tompa-Woll
攻击以及子秘密只能单次使用的问题, 本文提出了一种基于LCD 码的可验证多秘密共享方案 …

Crucial and redundant shares and compartments in secret sharing

F Schillinger, C Schindelhauer - 2020 IEEE/ACS 17th …, 2020 - ieeexplore.ieee.org
Secret sharing is the well-known problem of splitting a secret into multiple shares, which are
distributed to shareholders. When enough or the correct combination of shareholders work …

Proba: privacy-preserving, robust and accessible blockchain-powered helios

S Kocaman - 2024 - open.metu.edu.tr
Helios is the first web-based and open-audit voting system. The open-audit feature allows
anyone to track the voting process, thus providing easy verifiability in all stages of the …

[HTML][HTML] Конструкции некоторых схем разделения секрета на основе линейных кодов

СМ Рацеев - Известия Саратовского университета. Новая серия …, 2024 - cyberleninka.ru
Среди пороговых схем разделения секрета существуют совершенные схемы со
свойством идеальности (например, схема Шамира). Для случая схем разделения …

[引用][C] 可重用多属性多等级门限秘密共享

焦栋, 李明楚, 郭成, 喻言, 欧进萍 - 计算机工程与应用, 2014

[引用][C] 基于Birkhoff 插值的可验证秘密共享算法

郭宇, 陈言红, 张梅 - 测控技术, 2016