Now showing items 1-2 of 2
Protected Secret Sharing and its Application to Threshold Cryptography
(University of Missouri--Kansas City, 2016)
In the secret reconstruction of Shamir’s (t,n) secret sharing scheme (SS), shares released by shareholders need to be protected otherwise, non-shareholders can also obtain the secret. Key establishment protocol can ...
A New Strong Proactive Verifiable Secret Sharing Scheme with Unconditional Security
(University of Missouri--Kansas City, 2010)
In secret sharing scheme, the master secret and all the private shares (which are distributed by the dealer to the shareholders) are the two secrets which are to be maintained confidentially. In all the secret sharing ...