2015
DOI: 10.1002/sec.1283
|View full text |Cite
|
Sign up to set email alerts
|

A cheater identifiable multi‐secret sharing scheme based on the Chinese remainder theorem

Abstract: There are many researches on the polynomial‐based verifiable (k,n) multi‐secret sharing scheme (VMSSS), but none of them focuses on the Chinese remainder theorem (CRT)‐based VMSSS so far. For the first time, we provide a cheater identifiable multi‐secret sharing scheme based on CRT as an alternative method for VMSSS, which is unconditionally secure when the number of cheaters t≤(k − 1)/3. We adopt an encoding method, which makes multiple secrets to be transferred as a single one. In addition, we utilize a sing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…In (t, n) threshold SSS, the secret s splits into n shares in such a way that t participants or more than t can reconstruct or obtain s but participants less than t cannot obtain any information about s [1].…”
Section: Threshold Secret Sharing Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…In (t, n) threshold SSS, the secret s splits into n shares in such a way that t participants or more than t can reconstruct or obtain s but participants less than t cannot obtain any information about s [1].…”
Section: Threshold Secret Sharing Techniquesmentioning
confidence: 99%
“…Blakley [1] 1979 Geometry based No Ideal It is not perfect & Ideal SSS as Shamir"s SSS. It is less space efficient than Shamir"s scheme Mignott's [5] 1982 CRT based No Ideal It is not perfect secret sharing scheme…”
Section: Threshold Secret Sharing Techniquesmentioning
confidence: 99%
“…The verifiable secret sharing (VSS) is one of the solutions to detect and identify the adversary in the reconstruction phase. Some VSS schemes are proposed by Harn et al (2014), Liu et al (2015), Chen et al (2015), which are based on CRT. However, the VSS schemes require much computational time, as it performs more calculations for both verification and reconstruction.…”
Section: Introductionmentioning
confidence: 99%