Threshold changeable secret sharing schemes revisited
From MaRDI portal
Publication:764347
DOI10.1016/j.tcs.2011.09.027zbMath1236.94085OpenAlexW2156704793MaRDI QIDQ764347
Zhifang Zhang, Huaxiong Wang, Yeow Meng Chee, San Ling, Mu-Lan Liu
Publication date: 13 March 2012
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2011.09.027
secret sharing schemesperfect securitycomputational securitythreshold changeable secret sharing schemes
Related Items (11)
Secret sharing with secure secret reconstruction ⋮ Dynamic hierarchical quantum secret sharing with general access structure ⋮ Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities ⋮ Full threshold change range of threshold changeable secret sharing ⋮ Bivariate polynomial-based secret sharing schemes with secure secret reconstruction ⋮ A new threshold changeable secret sharing scheme based on the Chinese remainder theorem ⋮ Security analysis of a dynamic threshold secret sharing scheme using linear subspace method ⋮ Ramp scheme based on CRT for polynomial ring over finite field ⋮ Threshold Changeable Ramp Secret Sharing ⋮ Secret image sharing scheme with threshold changeable capability ⋮ Dynamic threshold secret reconstruction and its application to the threshold cryptography
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fully dynamic secret sharing schemes
- How to share a secret
- Updating the Parameters of a Threshold Scheme by Minimal Broadcast
- Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes
- On Secret Reconstruction in Secret Sharing Schemes
- Foundations of Cryptography
- Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures
- Selected Areas in Cryptography
This page was built for publication: Threshold changeable secret sharing schemes revisited