Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem.

Maryam Sheikhi-Garjan,Mojtaba Bahramian,Christophe Doche

IET Information Security(2019)

引用 21|浏览7
暂无评分
摘要
In this study, the authors propose a new protocol to share secret shadows for verifiable (t,n) secret sharing (VSS) schemes. Unlike traditional VSS schemes, whose communications between the dealer and the participants require a secure channel, the authors' new scheme relies on the elliptic curve cryptosystem and the Chinese remainder theorem operates over a public channel. The security of the secr...
更多
查看译文
关键词
public key cryptography
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要