Multi-Stage Secret Sharing Schemes Based on Asmuth’s Bloom Sequence
Abstract
Keywords
Full Text:
PDFReferences
G.R. Blakly, Safeguarding cryptographic keys, AFIPS, Vol. 48 (1979), pp. 313-317.
Shamir, A. 1979. How to share a secret. Comm.ACM 22, 612-613.
Ting - Yi Chang,Min-Shiang Hwang, Wei-Pang Yang A new multi-stage secret sharing scheme using one-wayfunction. ACM SIGOPS Operating Systems Volume 39 Issue 1, Pages 48 - 55, January 2005.
Hui - Xian Li,Chun-Tian Cheng, and Liao-Jun Pang An Improved Multi-stage (t, n)-Threshold Secret Sharing Scheme. WAIM 2005, LNCS 3739, pp. 267 ˆaA¸S 274, 2005. Al’ Springer-Verlag Berlin Heidelberg 2005. ˆ
Jackson Wen-Ai, Martin, Keith, M., O’Keefe, Christine M.: On Sharing Many Secrets. In:Pieprzyk,J., Safavi-Naini, R. (eds.), Asiacrypt’94. Lecture Notes in Computer Science,Vol. 917. Springer-Verlag, Berlin Heidelberg New York (1995) 42 54.
Ting - Yi Chang, Chou-Chen Yang, and Min-Shiang Hwang. Threshold untraceable signature for group communication. IEEE Proceedings-Communications, accepted (July 26, 2003) and to appear.
Ting - Yi Chang, Chou-Chen Yang, and Min-Shian Hwang. Threshold signature for group communications without shared distribution center. Future Generation Computer Systems, accepted (June 20, 2003) and to appear.
Min-Shiang Hwang, Cheng-Chi Lee, and Ting-Yi Chang. Broadcasting cryptosystem in computer network usinggeometric properties of lines. Journal of Information Science and Engineering,18(3):373-378, 2002.
J. He, E. Dawson, Multisecret-sharing scheme based on one-way function, Electronics Letters 31 (2) (1995) 93-95.
J. He, E. Dawson, Multisecret-sharing scheme based on one-way function, Electronics Letters 31 (2)(1995) 93-95.
L. Harn, Comment: Multistage secret sharing based on one-way function, Electronics Letters 31 (4) (1995) 262.
Xukai Zou,Fabio Maino,Elisa Bertino,Yan Sui,Kai Wang,Feng Li.A New Approach to Weighted Multi-Secret Sharing.10.1109/ICCCN.(2011).
M. Mignotte. How to share a secret. In T. Beth, editor,Cryptography-Proceedings of the Work-shop on Cryptography, Burg Feuerstein, 1982, volume 149 of Lecture Notes in Computer Science,pp. 371-375. Springer-Verlag, 1983.
Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Transactions on Information Theory IT-29(2),pp. 208-210 (1983).
O. Bidya Chanu, Appala Naidu T, V.Ch.Venkaiah, Multi-Stage Multi-Secret Sharing Schemes Based on Chinese Remainder Theorem,. ICARCSET '15 Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015), Article No. 17, ISBN: 978-1-4503-3441-9
Anjaneyulu Endurthi, Oinam B Chanu, Appala Naidu Tentu and V. Ch. Venkaiah. Reusable Multi-Stage Multi-Secret Sharing Schemes based on CRT., Journal of Communications Software and Systems (JCOMSS) ,Vol. 11, No. 1, pp. 15-24, March 2015.
Anjaneyulu Endurthi, Appala Naidu Tentu and Ch. V Venkaiah. Article: Reusable Multi-Stage Multi-Secret Sharing Scheme based on Asmuth-Bloom Sequence. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2014(3):1-6, March 2015, ISBN:973-93-80885-90-2.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.