A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem
X Jia, D Wang, D Nie, X Luo, JZ Sun - Information sciences, 2019 - Elsevier
A general (t, n) secret sharing (SS) scheme with fixed threshold allows a secret to be shared
without considering the time dynamic nature of the security environment. In this paper, we …
without considering the time dynamic nature of the security environment. In this paper, we …
An efficient lattice based multi-stage secret sharing scheme
H Pilaram, T Eghlidos - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
In this paper, we construct a lattice based (t, n) threshold multi-stage secret sharing (MSSS)
scheme according to Ajtai's construction for one-way functions. In an MSSS scheme, the …
scheme according to Ajtai's construction for one-way functions. In an MSSS scheme, the …
Threshold changeable secret sharing schemes revisited
This paper studies the methods for changing thresholds in the absence of secure channels
after the setup of threshold secret sharing schemes. First, we construct a perfect (t, n) …
after the setup of threshold secret sharing schemes. First, we construct a perfect (t, n) …
Threshold changeable secret sharing with secure secret reconstruction
K Meng, F Miao, W Huang, Y Xiong - Information Processing Letters, 2020 - Elsevier
Abstract (t, n) threshold secret sharing (SS) is an important cryptographic primitive in which a
secret is divided into n shares, and then any t or more shareholders can exchange shares to …
secret is divided into n shares, and then any t or more shareholders can exchange shares to …
[PDF][PDF] On dealer-free dynamic threshold schemes.
M Nojoumian, DR Stinson - Adv. Math. Commun., 2013 - faculty.eng.fau.edu
In a threshold scheme, the sensitivity of the secret as well as the number of players may
fluctuate due to various reasons, eg, mutual trust may vary or the structure of the players' …
fluctuate due to various reasons, eg, mutual trust may vary or the structure of the players' …
On secret reconstruction in secret sharing schemes
A secret sharing scheme typically requires secure communications in each of two
distribution phases:(1) a dealer distributes shares to participants (share distribution phase); …
distribution phases:(1) a dealer distributes shares to participants (share distribution phase); …
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
Abstract A (t, n)-threshold scheme with secure secret reconstruction, or a (t, n)-SSR scheme
for short, is a (t, n)-threshold scheme against the outside adversary who has no valid share …
for short, is a (t, n)-threshold scheme against the outside adversary who has no valid share …
Lattice-based threshold changeability for standard shamir secret-sharing schemes
We consider the problem of increasing the threshold parameter of a secret-sharing scheme
after the setup (share distribution) phase, without further communication between the dealer …
after the setup (share distribution) phase, without further communication between the dealer …
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
H Pilaram, T Eghlidos, R Toluee - IET Information Security, 2021 - Wiley Online Library
Secret sharing is a cryptographic technique used in many different applications such as
cloud computing, multi‐party computation and electronic voting. Security concerns in these …
cloud computing, multi‐party computation and electronic voting. Security concerns in these …
Novel threshold changeable secret sharing schemes based on polynomial interpolation
After any distribution of secret sharing shadows in a threshold changeable secret sharing
scheme, the threshold may need to be adjusted to deal with changes in the security policy …
scheme, the threshold may need to be adjusted to deal with changes in the security policy …