CRT based threshold multi secret sharing scheme

被引:0
|
作者
Subba Rao, Y.V. [1 ]
Bhagvati, Chakravarthy [1 ]
机构
[1] Department of CIS, University of Hyderabad, Hyderabad 500046, India
关键词
Cryptography;
D O I
暂无
中图分类号
TN911 [通信理论];
学科分类号
081002 ;
摘要
This paper presents a novel secret sharing system that is based on Chinese remainder theorem. This scheme deals with a concept of multiple secrets to be shared to difierent groups, such that each group receives shares of secret intended for it. The sharing is a threshold scheme, that is more than a fixed number of members from any particular group, will be able to reconstruct the secret and any smaller set will not be able to know what it is. Resource requirements here are not very high as in other cryptography schemes and is suitable for resource constrained environment for establishing session key or any such random secrets which they can use for short time.
引用
收藏
页码:249 / 255
相关论文
共 50 条
  • [21] Dynamic threshold secret sharing scheme
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    Qinghua Daxue Xuebao, 2006, 1 (102-105):
  • [22] Secure Multi-party Comparing Protocol based on Multi-threshold Secret Sharing Scheme
    Liu Wen
    Luo Shou-shan
    Wang Yong-bin
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [23] A Distributed Multi-secret Sharing Scheme on the (t,n) Threshold
    Chen, Guiqiang
    Wang, Huanwen
    Wang, Liqin
    Jin, Yue
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 358 - +
  • [24] An efficient (t, n)-threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Zhong Hong
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 580 - +
  • [25] A new (t, n)-threshold multi-secret sharing scheme
    Li, HX
    Cheng, CT
    Pang, LJ
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 421 - 426
  • [26] Dynamic threshold changeable multi-policy secret sharing scheme
    Wang, Feng
    Zhou, You-sheng
    Li, Dao-feng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3653 - 3658
  • [27] An Image Watermarking Scheme using Threshold Based Secret Sharing
    Latha, S. Bhargavi
    Reddy, D. Venkata
    Damodaram, A.
    2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, : 619 - 623
  • [28] Multipartite Secret Sharing Based on CRT
    Ching-Fang Hsu
    Lein Harn
    Wireless Personal Communications, 2014, 78 : 271 - 282
  • [29] Multipartite Secret Sharing Based on CRT
    Hsu, Ching-Fang
    Harn, Lein
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 78 (01) : 271 - 282
  • [30] Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation
    Zhang, En
    Zhu, Jun-Zhe
    Li, Gong-Li
    Chang, Jian
    Li, Yu
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019