Secret sharing is critical to most applications making use of security and remains one of the most challenging research areas in modern cryptography. In this paper, we propose a novel efficient multi-secret sharing scheme that is based on the (n, t, n) secret sharing technique. We use the Chinese remainder theorem (CRT) to generate secret shares and the reconstruction of secrets instead of using the Lagrange polynomial interpolation. In addition, we discuss the security of the scheme, and provide a new method to generate verifiable shares that make the proposed scheme a verifiable secret sharing scheme.
CITATION STYLE
Wen, W., Vaidya, B., Makrakis, D., & Adams, C. (2015). Decentralized CRT-based efficient verifiable (N, t, n) multi-secret sharing scheme. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8930, 279–293. https://doi.org/10.1007/978-3-319-17040-4_18
Mendeley helps you to discover research relevant for your work.