Title | ||
---|---|---|
A secret sharing scheme with a short share realizing the (t,n) threshold and the adversary structure |
Abstract | ||
---|---|---|
On the basis of the properties of the Jordan matrix, we proposed a secret sharing scheme which can realize both the (t,n) threshold and the adversary structure and share a large secret while each participant has a short share. At the same time, the scheme can prevent the participants from cheating. The shares can be kept secret in the process of reconstruction and do not need to be renewed when the shared secret is changed. If n participants want to share a large secret using a short share such that t or more participants can reconstruct the shared secret and there are some subsets that each contain at least t participants that cannot reconstruct the shared secret, our scheme will be effective. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1016/j.camwa.2011.12.067 | Computers & Mathematics with Applications |
Keywords | Field | DocType |
adversary structure,jordan matrix,large secret,short share,shared secret,n participant,secret sharing scheme,secret sharing | Secure multi-party computation,Secret sharing,Computer security,Verifiable secret sharing,Shamir's Secret Sharing,Cheating,Adversary,Shared secret,Homomorphic secret sharing,Mathematics | Journal |
Volume | Issue | ISSN |
64 | 4 | 0898-1221 |
Citations | PageRank | References |
9 | 0.51 | 4 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Dawei Zhao | 1 | 193 | 20.38 |
Haipeng Peng | 2 | 466 | 37.86 |
Cong Wang | 3 | 28 | 3.55 |
Yixian Yang | 4 | 1121 | 140.62 |