Dynamic and Verifiable Secret Sharing Among Weighted Participants

被引:0
|
作者
Yanshuo Zhang
Zhuojun Liu
机构
[1] Beijing Electronic Science and Technology Institute,Key Laboratory of Mathematics Mechanization
[2] CAS,undefined
关键词
Chinese Remainder Theorem; dynamic; secret sharing; verifiable; weighted;
D O I
暂无
中图分类号
学科分类号
摘要
A secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret. Secret sharing is useful in management of cryptographic keys. Based on identity, we analyze the secret sharing scheme among weighted participants. Then we present a dynamic scheme about secret sharing among weighted participants. At last, we analyze the secret sharing scheme among weighted participants, which can make all weighted participants verifiable and dynamic.
引用
收藏
页码:481 / 485
页数:4
相关论文
共 50 条
  • [31] Design and analysis of a verifiable secret sharing scheme
    Li, Hui-Xian
    Cai, Wan-Dong
    Pei, Qing-Qi
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2008, 35 (01): : 148 - 151
  • [32] A quantum secret sharing scheme with verifiable function
    Liu, Li-Juan
    Li, Zhi-Hui
    Han, Zhao-Wei
    Zhi, Dan-Li
    EUROPEAN PHYSICAL JOURNAL D, 2020, 74 (07):
  • [33] Verifiable secret sharing in a total of three rounds
    Agrawal, Shashank
    INFORMATION PROCESSING LETTERS, 2012, 112 (22) : 856 - 859
  • [34] Homomorphisms of secret sharing schemes: A tool for verifiable signature sharing
    Burmester, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 96 - 106
  • [35] STRONG VERIFIABLE SECRET SHARING EXTENDED ABSTRACT
    DWORK, C
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 486 : 213 - 227
  • [36] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [37] Dynamic and verifiable threshold multi-secret sharing scheme based on bilinear pairings
    Li, Huina
    ICIC Express Letters, 2015, 9 (10): : 2819 - 2825
  • [38] Sigma Protocols from Verifiable Secret Sharing and Their Applications
    Zhang, Min
    Chen, Yu
    Yao, Chuanzhou
    Wang, Zhichao
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT II, 2023, 14439 : 208 - 242
  • [39] Batch-verifiable Secret Sharing with Unconditional Privacy
    Krenn, Stephan
    Unser, Thomas Lor
    Striecks, Christoph
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 303 - 311
  • [40] A Finite Equivalence of Verifiable Multi-secret Sharing
    Zhao, Hui
    Li, Mingchu
    Sakurai, Kouichi
    Ren, Yizhi
    Sun, Jonathan Z.
    Wang, Fengying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01) : 1 - 12