Javascript must be enabled to continue!
Verifiable secret sharing based on the Chinese remainder theorem
View through CrossRef
ABSTRACTA (t,n) secret sharing scheme (SS) enables a dealer to divide a secret into n shares in such a way that (i) the secret can be recovered successfully with t or more than t shares, and (ii) the secret cannot be recovered with fewer than t shares. A verifiable secret sharing scheme (VSS) has been proposed to allow shareholders to verify that their shares are generated by the dealer consistently without compromising the secrecy of both shares and the secret. So far, there is only one secure Chinese remainder theorem‐based VSS using the RSA assumption. We propose a Chinese remainder theorem‐based VSS scheme without making any computational assumptions, which is a simple extension of Azimuth–Bloom (t,n) SS. Just like the most well‐known Shamir's SS, the proposed VSS is unconditionally secure. We use a linear combination of both the secret and the verification secret to protect the secrecy of both the secret and shares in the verification. In addition, we show that no information is leaked when there are fewer than t shares in the secret reconstruction. Copyright © 2013 John Wiley & Sons, Ltd.
Title: Verifiable secret sharing based on the Chinese remainder theorem
Description:
ABSTRACTA (t,n) secret sharing scheme (SS) enables a dealer to divide a secret into n shares in such a way that (i) the secret can be recovered successfully with t or more than t shares, and (ii) the secret cannot be recovered with fewer than t shares.
A verifiable secret sharing scheme (VSS) has been proposed to allow shareholders to verify that their shares are generated by the dealer consistently without compromising the secrecy of both shares and the secret.
So far, there is only one secure Chinese remainder theorem‐based VSS using the RSA assumption.
We propose a Chinese remainder theorem‐based VSS scheme without making any computational assumptions, which is a simple extension of Azimuth–Bloom (t,n) SS.
Just like the most well‐known Shamir's SS, the proposed VSS is unconditionally secure.
We use a linear combination of both the secret and the verification secret to protect the secrecy of both the secret and shares in the verification.
In addition, we show that no information is leaked when there are fewer than t shares in the secret reconstruction.
Copyright © 2013 John Wiley & Sons, Ltd.
Related Results
Are Joint Controllers Joint Trade Secret Owners? What EU Data Protection and US Information Privacy Law Tell Us About Trade Secret Law
Are Joint Controllers Joint Trade Secret Owners? What EU Data Protection and US Information Privacy Law Tell Us About Trade Secret Law
The article focusses on (joint) trade secret ownership as a (neglected) aspect of European Union (EU) and United States (US) Trade Secret Law. The article shows that Information Pr...
Exploring Algebraic Properties and the Applications of Chinese Remainder Theorem
Exploring Algebraic Properties and the Applications of Chinese Remainder Theorem
This research aims to identify the algebraic properties of the Chinese Remainder Theorem or CRT. Chinese Remainder Theorem is an ancient mathematical theorem that allows the soluti...
Text image secret sharing with hiding based on color feature
Text image secret sharing with hiding based on color feature
The Secret Sharing is a scheme for sharing data into n pieces using (k, n) threshold method. Secret Sharing becomes an efficient method to ensure secure data transmission. Some vis...
Optimal Double Layer Secret Sharing Scheme for Biometrics
Optimal Double Layer Secret Sharing Scheme for Biometrics
Visual secret sharing (VSS) method is an encryption method to ensure the Security of secret data, that just performs the partitioning of ‘n’ shares and distributes among ‘n’ users ...
Attribute-based publicly verifiable secret sharing
Attribute-based publicly verifiable secret sharing
Abstract
Can a dealer share a secret without knowing the shareholders? We provide a positive answer to this question by introducing the concept of an attribute-ba...
Le secret bancaire. Etude de droit comparé (France-Suisse)
Le secret bancaire. Etude de droit comparé (France-Suisse)
Si le secret bancaire helvétique fait régulièrement l'objet de virulentes critiques et attaques sur le plan de la scène politique internationale, à chaque crise, un constat s'impos...
Application of Number Theory in the Guess Year of Birth Game
Application of Number Theory in the Guess Year of Birth Game
Number theory is a field of mathematics in which numbers are discussed. There are many developments in this theory. Among them are divisibility, modulo, inverse modulo, congruence ...
The impact of employees’ relationships on tacit knowledge sharing
The impact of employees’ relationships on tacit knowledge sharing
Purpose– This paper aims to study the impact of individual relationships on tacit knowledge sharing in the company setting of compulsory bond, expressive bond, instrumental bond an...

