(t,n) secret sharing scheme based on the LUC cryptosystem

被引:0
|
作者
Pang, Liao-Jun [1 ]
Wang, Yu-Min [1 ]
机构
[1] State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
关键词
Cooperative participant - LUC cryptosystem - Private key - Pseudo share - Secret dealer - Secret sharing - Threshold scheme - Threshold secret;
D O I
暂无
中图分类号
学科分类号
摘要
引用
下载
收藏
页码:927 / 930
相关论文
共 50 条
  • [31] A (t,m,n)-Group Oriented Secret Sharing Scheme
    Miao Fuyou
    Fan Yuanyuan
    Wang Xingfu
    Xiong Yan
    Badawy, Moaman
    CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (01) : 174 - 178
  • [32] Detection and identification of cheaters in (t, n) secret sharing scheme
    Harn, Lein
    Lin, Changlu
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 52 (01) : 15 - 24
  • [33] A (t, n) Threshold Quantum Secret Sharing Scheme with Fairness
    Li, Fulin
    Chen, Tingyan
    Zhu, Shixin
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2023, 62 (06)
  • [34] A New (t, n) Multi-secret Sharing Scheme
    Tan, Xiao-qing
    Wang, Zhi-guo
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 861 - +
  • [35] V-fairness (t,n) secret sharing scheme
    Laih, CS
    Lee, YC
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (04): : 245 - 248
  • [36] A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction
    Meng, Li
    Qu Shaoyun
    Xun Tiantian
    Jia, Yu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 191 - 204
  • [37] A Novel (t,n) Secret Sharing Scheme Based upon Euler's Theorem
    Chen, Hefeng
    Chang, Chin-Chen
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [38] Verifiable (t, n) Threshold Secret Sharing Scheme Using ECC Based Signcryption
    Basu, Atanu
    Sengupta, Indranil
    INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT, PROCEEDINGS, 2010, 54 : 133 - 144
  • [39] A new (t, n) multi-secret sharing scheme based on linear algebra
    Hassani, Seyed Hamed
    Aref, Mohammad Reza
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 443 - +
  • [40] An Efficient Probability-based t out of n Secret Image Sharing Scheme
    Chang, Chi-Chen
    Wang, Yu-Zheng
    Chan, Chi-Shiang
    2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING SYMPOSIA, VOLS 1-5, PROCEEDINGS, 2008, : 288 - +