2005
DOI: 10.1016/j.amc.2004.04.081
|View full text |Cite
|
Sign up to set email alerts
|

A scheme for threshold multi-secret sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
38
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 45 publications
(38 citation statements)
references
References 4 publications
0
38
0
Order By: Relevance
“…Hence, it does not seem reasonable to compare these two types of multi-secret sharing schemes. In addition, in [10] there is an increase in the share size as a consequence of applying the Chinese Reminder Theorem on different sub-shadows. Indeed, in this scheme, the share size is equal to the sum of the secret sizes.…”
Section: Comparative Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, it does not seem reasonable to compare these two types of multi-secret sharing schemes. In addition, in [10] there is an increase in the share size as a consequence of applying the Chinese Reminder Theorem on different sub-shadows. Indeed, in this scheme, the share size is equal to the sum of the secret sizes.…”
Section: Comparative Resultsmentioning
confidence: 99%
“…Later, various MSS schemes were presented based on different methods such as coding approach [8], congruence relations and Chinese Reminder Theorem [10] and linear equations [9]. The computational complexity and number of public values are two important factors for comparing the efficiency of MSS schemes and a number of publications appeared to reduce the value of these parameters [11] and [12].…”
Section: Introductionmentioning
confidence: 99%
“…A threshold secret sharing scheme has many practical applications, such as opening a bank vault, launching a nuclear, or authenticating an electronic funds transfer. Later, several multisecret sharing schemes were proposed [8][9][10][11][12]. In a multisecret sharing scheme, there are multiple secrets to be shared during one secret sharing process.…”
Section: Introductionmentioning
confidence: 99%
“…One can imagine that any pair of officers can reconstruct the coordinates of the target and then initialize the process by mobilizing the appropriate equipment (plane, submarine, missile) but only subsets of 8 out of 10 generals can get access to the bomb activation code and launch the strike. Recently Chan and Chang designed such a construction [2] but it only allows a single secret to be shared per threshold value.…”
Section: Introductionmentioning
confidence: 99%
“…In this article, we propose a generalization of [2,19] by introducing a Verifiable Multi-Threshold Multi-secret Sharing Scheme (VMTMSS) where several secrets can be shared per threshold value. The security of our multiple time scheme is guaranteed as soon as keyed one-way functions and collision resistant one-way functions exist.…”
Section: Introductionmentioning
confidence: 99%