CRT based multi-secret sharing schemes: revisited

AN Tentu, VC Venkaiah… - International Journal of …, 2018 - inderscienceonline.com
Secret sharing is a cryptographic primitive, which is used to distribute a secret among a set
of participants in such a way that an authorised subset of participants can uniquely …

Conjunctive hierarchical multi-secret sharing scheme using elliptic curves

M Chintamani, P Paul, L Sa - Indian Journal of Pure and Applied …, 2023 - Springer
A method in which a secret is distributed among the users and a predefined number of users
collaborate to reconstruct the secret is known as a secret sharing scheme. In this article, we …

Secret sharing on evolving multi-level access structure

S Dutta, PS Roy, K Fukushima, S Kiyomoto… - … on Information Security …, 2019 - Springer
Secret sharing is a process that allows storing secret information in a distributed manner
among several participants. In the original setting of secret sharing schemes, it was …

Computationally perfect compartmented secret sharing schemes based on MDS codes

AN Tentu, P Paul, VC Venkaiah - International Journal of …, 2014 - inderscienceonline.com
Two compartmented secret sharing schemes are proposed in this paper. Constructions of
the proposed schemes are based on the maximum distance separable (MDS) codes. One of …

Conjunctive hierarchical secret sharing by finite geometry

M Gyarmati, P Ligeti, P Sziklai, M Takáts - Designs, Codes and …, 2024 - Springer
Secret sharing is a general method for distributing sensitive data among the participants of a
system such that only a collection of predefined qualified coalitions can recover the secret …

Classification of a class of code and applications in secret-sharing schemes

B Pandey, P Paul - Discrete Mathematics, Algorithms and …, 2024 - World Scientific
A q-ary linear [n, k, n− k−(i− 1)] code ℒ is known as A i MDS code. If d= n− k+ 1, the code is
called a maximum distance separable code. MDS codes are known to be useful in the secret …

Hierarchical secret sharing schemes secure against rushing adversary: cheater identification and robustness

PS Roy, S Dutta, K Morozov, A Adhikari… - … Security Practice and …, 2018 - Springer
Threshold access structures of secret sharing schemes capture a scenario in which all the
participants have the same weight (or power) and their contributions are equal. However, in …

A Perfect Ideal Hierarchical Secret Sharing Scheme Based on the CRT for Polynomial Rings

J Yang, ST Xia, X Wang, J Yuan… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
In this paper, for the first time, we propose a new explicit hierarchical threshold secret
sharing (HTSS) scheme based on the Chinese Remainder Theorem (CRT) for polynomial …

Private Communication Based on Hierarchical Identity-Based Cryptography

D Kalyani, R Sridevi - Emerging Technologies in Data Mining and …, 2019 - Springer
Abstract Public Key Infrastructure (PKI) is an important tool for securing information in the
communication. Presently, a PKI framework demonstrates a pattern toward an emerging …

Generalised secret sharing scheme for non-monotone access structures using MDS codes

SK Nallabothu, NR Rekha… - International Journal of …, 2024 - inderscienceonline.com
A secret sharing scheme is a powerful tool for protecting sensitive data with applications in
access control, key management schemes, blockchains, etc. A generalised secret sharing …