2018
DOI: 10.1007/s11277-017-5187-y
|View full text |Cite
|
Sign up to set email alerts
|

A New Gradual Secret Sharing Scheme with Diverse Access Structure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Lemma 1: If the CDH assumption is true on an elliptic curve, then the proposed tripartite authenticated key agreement protocol in this paper is a secure Tri-KA protocol. Proof: From the equations in (20) and 27, we can determine that protocol participants in matching sessions obtain the same final session key, which meets the first condition in definition 3. Next, we should prove that the proposed tripartite authenticated key agreement protocol meets the second condition in definition 3.…”
Section: A Security Proof Of the Proposed Tripartite Authenticated Kmentioning
confidence: 99%
See 1 more Smart Citation
“…Lemma 1: If the CDH assumption is true on an elliptic curve, then the proposed tripartite authenticated key agreement protocol in this paper is a secure Tri-KA protocol. Proof: From the equations in (20) and 27, we can determine that protocol participants in matching sessions obtain the same final session key, which meets the first condition in definition 3. Next, we should prove that the proposed tripartite authenticated key agreement protocol meets the second condition in definition 3.…”
Section: A Security Proof Of the Proposed Tripartite Authenticated Kmentioning
confidence: 99%
“…Shamir's scheme used Lagrange interpolation, while Blakley's scheme was based on the intersection of multiple multidimensional spaces. Subsequently, researchers have designed secret sharing schemes based on the Chinese Remainder Theorem (CRT) [19], [20] and Attribute-based Encryption (ABE) [21]. The above schemes are also referred to as (t, n) threshold cryptography.…”
Section: ) Secret Sharing Schemementioning
confidence: 99%