A threshold multi-secret sharing scheme

被引:0
|
作者
Shi Runhua [1 ,2 ]
Huang Liusheng [1 ]
Luo yonglong [1 ]
Zhong Hong [2 ]
机构
[1] Univ Sci & Technol China, Dept Comp Sci & Technol, Hefei 230027, Anhui, Peoples R China
[2] Anhui Univ, Sch Comp Sci & Technol, Hefei 230039, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a threshold multi-secret sharing scheme. In such a scheme, many secrets are shared in such a way that all secrets can be reconstructed independently without refreshing the shares. Every share is of the same size as that of any single shared secret in the proposed scheme. The number of public values in the proposed scheme is same as that of He and Dawson's scheme, which has been proved that it is only one-time-use scheme, but the proposed scheme is a multi-use scheme really, what is more important, it is more efficient since there will be t(i) secrets to be shared and reconstructed at the same time according to each (t(i),n)-threshold access structure. That is, there are more secrets to be shared and reconstructed in the proposed scheme.
引用
收藏
页码:1705 / +
页数:2
相关论文
共 50 条
  • [1] A scheme for threshold multi-secret sharing
    Chan, CW
    Chang, CC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 1 - 14
  • [2] A Hierarchical Threshold Multi-secret Sharing Scheme
    Shi Runhua
    Zhong Hong
    [J]. 2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 231 - 234
  • [3] Multi-secret sharing threshold visual cryptography scheme
    Yu, Bin
    Xu, Xiaohui
    Fang, Liguo
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 815 - +
  • [4] A hierarchical weighted threshold multi-secret sharing scheme
    Chang, CC
    Pan, YP
    [J]. Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 333 - 340
  • [5] Identity (ID)-based threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Pei, Qing-Qi
    Jiao, Li-Cheng
    Wang, Yu-Min
    [J]. Ruan Jian Xue Bao/Journal of Software, 2008, 19 (10): : 2739 - 2745
  • [6] A new (t, n)-threshold multi-secret sharing scheme
    Li, HX
    Cheng, CT
    Pang, LJ
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 421 - 426
  • [7] A Distributed Multi-secret Sharing Scheme on the (t,n) Threshold
    Chen, Guiqiang
    Wang, Huanwen
    Wang, Liqin
    Jin, Yue
    [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 358 - +
  • [8] An efficient (t, n)-threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Zhong Hong
    [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 580 - +
  • [9] Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem
    Song, Yinong
    Li, Zichen
    [J]. 2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 131 - 135
  • [10] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138