Decentralized CRT-based efficient verifiable (N, t, n) multi-secret sharing scheme

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Secret sharing is critical to most applications making use of security and remains one of the most challenging research areas in modern cryptography. In this paper, we propose a novel efficient multi-secret sharing scheme that is based on the (n, t, n) secret sharing technique. We use the Chinese remainder theorem (CRT) to generate secret shares and the reconstruction of secrets instead of using the Lagrange polynomial interpolation. In addition, we discuss the security of the scheme, and provide a new method to generate verifiable shares that make the proposed scheme a verifiable secret sharing scheme.

Cite

CITATION STYLE

APA

Wen, W., Vaidya, B., Makrakis, D., & Adams, C. (2015). Decentralized CRT-based efficient verifiable (N, t, n) multi-secret sharing scheme. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8930, 279–293. https://doi.org/10.1007/978-3-319-17040-4_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free