Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem

被引:0
|
作者
Song, Yinong [1 ]
Li, Zichen [1 ]
机构
[1] Beijing Inst Graph Commun, Informat & Engn Acad, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Chinese Remainder Theorem; Multi-secret sharing; Threshold-varying secret sharing; Asmuth-Bloom secret sharing scheme;
D O I
10.1109/ICICSE61805.2024.10625673
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To address the limitations of traditional secret sharing schemes, this paper proposes a multi-secret threshold sharing scheme based on the Chinese Remainder Theorem. In this scheme, multiple secrets and their shares can be unordered as needed. The distributor can modify secrets according to actual requirements, including updating, adding, and subtracting. Each participant in this scheme holds their unique share, and the distributor can send different additional information to each participant based on these shares. Participants in this scheme can reuse their shares to store each new set of secrets without refreshing their shares. Through scheme analysis, this paper proves that the proposed scheme ensures correctness and security. Experimental results further validate that the scheme meets the requirements of efficiency while ensuring correctness and security.
引用
收藏
页码:131 / 135
页数:5
相关论文
共 50 条
  • [1] A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem
    Chen, Zhenhua
    Li, Shundong
    Zhu, Youwen
    Yan, Jianhua
    Xu, Xinli
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3592 - 3601
  • [2] Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem
    Sheikhi-Garjan, Maryam
    Bahramian, Mojtaba
    Doche, Christophe
    [J]. IET INFORMATION SECURITY, 2019, 13 (03) : 278 - 284
  • [3] A Threshold Secret Sharing Scheme Based on LMCA and Chinese Remainder Theorem
    Lu, Dianjun
    Wang, Yu
    Zhang, Xiaoqin
    Ji, Lanfen
    [J]. PROCEEDINGS OF 2016 9TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2016, : 439 - 442
  • [4] Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem
    Li, Lele
    Han, Zhaowei
    Li, Zhihui
    Guan, Feiting
    Zhang, Li
    [J]. QUANTUM INFORMATION PROCESSING, 2024, 23 (02)
  • [5] Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem
    Lele Li
    Zhaowei Han
    Zhihui Li
    Feiting Guan
    Li Zhang
    [J]. Quantum Information Processing, 23
  • [6] Multi-Stage Multi-Secret Sharing Schemes Based on Chinese Remainder Theorem
    Chanu, Oinam Bidyapati
    Tentu, Appala Naidu
    Venkaiah, V. Ch
    [J]. ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [7] A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem
    Kiasari, Mohammad Ebrahim Ebrahimi
    Pakniat, Nasrollah
    Mirghadri, Abdolrasoul
    Nazari, Mojtaba
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (01): : 125 - 135
  • [8] A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Wang, Daoshun
    Nie, Daxin
    Luo, Xiangyang
    Sun, Jonathan Zheng
    [J]. INFORMATION SCIENCES, 2019, 473 : 13 - 30
  • [9] A (k, n) multi-secret image sharing scheme based on Chinese remainder theorem and Arnold cat map
    Chanu, Oinam B.
    Neelima, Arambam
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2021, 30 (02)
  • [10] A scheme for threshold multi-secret sharing
    Chan, CW
    Chang, CC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 1 - 14