2015
DOI: 10.1016/j.ipl.2015.06.014
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic threshold secret reconstruction and its application to the threshold cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 33 publications
(22 citation statements)
references
References 46 publications
(54 reference statements)
0
20
0
Order By: Relevance
“…The scheme reduced secret share size of the privileged participants, but the system parameters are harsh and the system is too complicated. Iftene based on Asmuth and Bloom scheme achieve a more secure weighted threshold secret sharing scheme, which need to construct the weighted Asmuth-Bloom sequence [Harn and Miao (2014); Harn and Hsu (2015)]. Wang et al [Wang, Zhou and Li (2015)] proposed a weighted secret sharing scheme based on the Chinese remainder theorem, it can effectively solve the problem of sharing pictures with different weights.…”
Section: Related Workmentioning
confidence: 99%
“…The scheme reduced secret share size of the privileged participants, but the system parameters are harsh and the system is too complicated. Iftene based on Asmuth and Bloom scheme achieve a more secure weighted threshold secret sharing scheme, which need to construct the weighted Asmuth-Bloom sequence [Harn and Miao (2014); Harn and Hsu (2015)]. Wang et al [Wang, Zhou and Li (2015)] proposed a weighted secret sharing scheme based on the Chinese remainder theorem, it can effectively solve the problem of sharing pictures with different weights.…”
Section: Related Workmentioning
confidence: 99%
“…Note that although bivariate polynomials have been used to design many different types of secret-sharing schemes in the literature, for example, verifiable secret-sharing (VSS) [15][16][17], pairwise key distribution [18][19][20][21], and dynamic secret-sharing [22], the purpose of this work is different from the previous ones, and the types of employed bivariate polynomials are different as well.…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…(4) information disclosure caused by some malicious participants. The discussion of changing threshold in traditional secret sharing [23][24][25] have already been proposed. However, SIS and traditional secret sharing are different, the researches on threshold changeable secret sharing could not be directly copied into TCSIS.…”
Section: Introductionmentioning
confidence: 99%