A Novel (t,n) Secret Sharing Scheme Based upon Euler's Theorem

被引:6
|
作者
Chen, Hefeng [1 ]
Chang, Chin-Chen [2 ]
机构
[1] Jimei Univ, Comp Engn Coll, Xiamen 361021, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 407, Taiwan
基金
中国国家自然科学基金;
关键词
ALGORITHM;
D O I
10.1155/2019/2387358
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The (t, n) secret sharing scheme is used to protect the privacy of information by distribution. More specifically, a dealer splits a secret into n shares and distributes them privately to n participants, in such a way that any t or more participants can reconstruct the secret, but no group of fewer than t participants who cooperate can determine it. Many schemes in literature are based on the polynomial interpolation or the Chinese remainder theorem. In this paper, we propose a new solution to the system of congruences different from Chinese remainder theorem and propose a new scheme for (t, n) secret sharing; its secret reconstruction is based upon Euler's theorem. Furthermore, our generalized conclusion allows the dealer to refresh the shared secret without changing the original share of the participants.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [2] (t,n) secret sharing scheme based on the LUC cryptosystem
    Pang, Liao-Jun
    Wang, Yu-Min
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2005, 32 (06): : 927 - 930
  • [3] A Novel(n,n)Secret Image Sharing Scheme Based on Sudoku
    Zhi-Hui Wang
    Cheng Guo
    Chin-Chen Chang
    Journal of Electronic Science and Technology, 2013, 11 (01) : 44 - 50
  • [4] A Novel (t, s, k, n) -Threshold Visual Secret Sharing Scheme Based on Access Structure Partition
    Liu, Zuquan
    Zhu, Guopu
    Wang, Yuan-Gen
    Yang, Jianquan
    Kwong, Sam
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 16 (04)
  • [5] A secret sharing scheme based on (t, n) threshold and adversary structure
    Qin, Huawang
    Dai, Yuewei
    Wang, Zhiquan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (05) : 379 - 385
  • [6] A secret sharing scheme based on (t, n) threshold and adversary structure
    Huawang Qin
    Yuewei Dai
    Zhiquan Wang
    International Journal of Information Security, 2009, 8
  • [7] Research and Application Based on A. Shamir's (t, n) Threshold Secret Sharing Scheme
    Li, Quandong
    Zhou, Yanhui
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 671 - 674
  • [8] Strong (n,t,n) verifiable secret sharing scheme
    Harn, Lein
    Lin, Changlu
    INFORMATION SCIENCES, 2010, 180 (16) : 3059 - 3064
  • [9] A Fair (t,n) Threshold Secret Sharing Scheme
    Xing, Minhong
    Li, Wenmin
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 140 - 143
  • [10] A New (t, n)-Threshold Secret Sharing Scheme
    Tang, Chunming
    Yao, Zheng-an
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 920 - +