A generalized Chinese remainder theorem-based proactive multi-secret sharing scheme for global wide area network

Author(s):  
Xiaoping Li ◽  
Ching-Chun Chang ◽  
Yanjun Liu
2015 ◽  
Vol 11 (1) ◽  
pp. 15 ◽  
Author(s):  
Anjaneyulu Endurthi ◽  
Oinam B. Chanu ◽  
Appala N. Tentu ◽  
V. Ch. Venkaiah

Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8]. The first scheme that uses the Mignotte’s sequence is a single secret scheme; the second one is an extension of the first one to Multi-secret sharing scheme. The third scheme is again for the case of multi-secrets but it is an improvement over the second scheme in the sense that it reduces the number of publicvalues. The first scheme that uses the Asmuth-Bloom sequence is designed for the case of a single secret and the second one is an extension of the first scheme to the case of multi-secrets. Novelty of the proposed schemes is that the shares of the participants are reusable i.e. same shares are applicable even with a new secret. Also only one share needs to be kept by each participant even for the muslti-secret sharing scheme. Further, the schemes are capable of verifying the honesty of the participants including the dealer. Correctness of the proposed schemes is discussed and show that the proposed schemes are computationally secure.


2015 ◽  
Vol 8 (18) ◽  
pp. 3592-3601 ◽  
Author(s):  
Zhenhua Chen ◽  
Shundong Li ◽  
Youwen Zhu ◽  
Jianhua Yan ◽  
Xinli Xu

2011 ◽  
Vol 30 (12) ◽  
pp. 3334-3336
Author(s):  
Wei WANG ◽  
Shun-xian ZHOU

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 70666-70673 ◽  
Author(s):  
Changlu Lin ◽  
Huidan Hu ◽  
Chin-Chen Chang ◽  
Shaohua Tang

Sign in / Sign up

Export Citation Format

Share Document