2020
DOI: 10.1109/access.2020.2968728
|View full text |Cite
|
Sign up to set email alerts
|

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme

Abstract: General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants. Verifiable multi-secret sharing enables a dealer to share multiple secrets among a group of participants such that the deceptive behaviors of the dealer and the participants can be detected. However, in the absence of secure channels, few verifiable secret sharing schemes can simultaneously share multiple secrets at one tim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 25 publications
(41 reference statements)
0
5
0
1
Order By: Relevance
“…We compared the computational cost and functions of several VSS schemes [28][29][30][31][32]. The specific comparison is shown in Tab.…”
Section: Polyvss Performance Analysismentioning
confidence: 99%
“…We compared the computational cost and functions of several VSS schemes [28][29][30][31][32]. The specific comparison is shown in Tab.…”
Section: Polyvss Performance Analysismentioning
confidence: 99%
“…It needs t 2 elliptic curve scalar multiplication operations to verify its correctness and other secret shadows. In the secret reconstruction stage, the PVS-MSS scheme shares the secret on the coefficient of f (x, 0), so the calculation cost in the secret reconstruction stage is the same as that in the scheme [23,28,30,31,33,36], both of which are Lagrange interpolation calculations, and the worst is Lagrange interpolation of k points. Suppose T M is the operation time of elliptic curve scalar multiplication.…”
Section: Scheme Comparison and Performance Analysismentioning
confidence: 99%
“…The scheme calculates the cost of the verification phase; when k ≤ t, it is t 2 T M ; when k > t, it is k 2 T M . This scheme calculates the cost of the reconstruction phase; when [23] tT M t 2 T M T L (t) Wang's [36] (n + 1)T P tT P T L (n + k)…”
Section: Scheme Comparison and Performance Analysismentioning
confidence: 99%
“…Dalam pertukaran informasi serangan siber antar organisasi, platform ISAC yang berklasifikasi rahasia harus diamankan dengan baik [14,15]. Penelitian terbaru tentang skema jaminan privasi dalam berbagi informasi atau data telah dilakukan dengan menyembunyikan identitas entitas atau informasi sensitif entitas [16,17].…”
Section: Pendahuluanunclassified