Javascript must be enabled to continue!
Verifiable secret sharing based on the Chinese remainder theorem
View through CrossRef
ABSTRACTA (t,n) secret sharing scheme (SS) enables a dealer to divide a secret into n shares in such a way that (i) the secret can be recovered successfully with t or more than t shares, and (ii) the secret cannot be recovered with fewer than t shares. A verifiable secret sharing scheme (VSS) has been proposed to allow shareholders to verify that their shares are generated by the dealer consistently without compromising the secrecy of both shares and the secret. So far, there is only one secure Chinese remainder theorem‐based VSS using the RSA assumption. We propose a Chinese remainder theorem‐based VSS scheme without making any computational assumptions, which is a simple extension of Azimuth–Bloom (t,n) SS. Just like the most well‐known Shamir's SS, the proposed VSS is unconditionally secure. We use a linear combination of both the secret and the verification secret to protect the secrecy of both the secret and shares in the verification. In addition, we show that no information is leaked when there are fewer than t shares in the secret reconstruction. Copyright © 2013 John Wiley & Sons, Ltd.
Title: Verifiable secret sharing based on the Chinese remainder theorem
Description:
ABSTRACTA (t,n) secret sharing scheme (SS) enables a dealer to divide a secret into n shares in such a way that (i) the secret can be recovered successfully with t or more than t shares, and (ii) the secret cannot be recovered with fewer than t shares.
A verifiable secret sharing scheme (VSS) has been proposed to allow shareholders to verify that their shares are generated by the dealer consistently without compromising the secrecy of both shares and the secret.
So far, there is only one secure Chinese remainder theorem‐based VSS using the RSA assumption.
We propose a Chinese remainder theorem‐based VSS scheme without making any computational assumptions, which is a simple extension of Azimuth–Bloom (t,n) SS.
Just like the most well‐known Shamir's SS, the proposed VSS is unconditionally secure.
We use a linear combination of both the secret and the verification secret to protect the secrecy of both the secret and shares in the verification.
In addition, we show that no information is leaked when there are fewer than t shares in the secret reconstruction.
Copyright © 2013 John Wiley & Sons, Ltd.
Related Results
The impact of employees’ relationships on tacit knowledge sharing
The impact of employees’ relationships on tacit knowledge sharing
Purpose– This paper aims to study the impact of individual relationships on tacit knowledge sharing in the company setting of compulsory bond, expressive bond, instrumental bond an...
Le secret de la défense nationale : la raison d'État dans l'œil du droit
Le secret de la défense nationale : la raison d'État dans l'œil du droit
Résumé Le régime juridique du secret de la défense nationale a connu le 1er juillet 2021 sa réforme la plus importante depuis le décret du 17 juillet 1998 qui fixait jusque-là le r...
Chinese cultural symbols in Thailand : a study of Mazu belief in the Chinese community in Bangkok Chinatown
Chinese cultural symbols in Thailand : a study of Mazu belief in the Chinese community in Bangkok Chinatown
The overseas Chinese living around the world constitute a unique and far-reaching social group in the development of modern human history. While seeking survival and development in...
Frequency estimation of undersampled sinusoidal signal based on chinese remainder theorem
Frequency estimation of undersampled sinusoidal signal based on chinese remainder theorem
Frequency estimation based on the reconstruction algorithm of the Chinese remainder theorem(CRT) is one of the frontier focuses in the fields of signal processing, electromagnetism...
The Changing role of Chinese language schools in Thailand before and after the 1990s
The Changing role of Chinese language schools in Thailand before and after the 1990s
To study the role of Chinese language schools in Thailand before and after the 1990s. The study covers analytic discussion in terms of economics, politics and culture. This thesis ...
Secret Histories
Secret Histories
Every Gothic fiction contains a secret history: lost manuscripts, doubled lives, mysterious menaces, dreaded revelations. More narrowly, secret histories are fictional works that o...
Invitation or Sexual Harassment?
Invitation or Sexual Harassment?
This article aims to analyse an intercultural telephone invitation given by a Chinese tutor to an Australian student, and highlight general principles of intercultural invitations....
Abstract 1370: Barriers to sharing biospecimens or biospecimen data among researchers: qualitative findings from a regional survey.
Abstract 1370: Barriers to sharing biospecimens or biospecimen data among researchers: qualitative findings from a regional survey.
Abstract
Background:
Efforts to identify biological and genetic factors contributing to cancer health disparities have increased the need to access bi...


