Key distribution and recovery algorithm based on Shamir's secret sharing
In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about the secret s. During the actual secret re...
Saved in:
Main Authors: | Hui-gui RONG, Jin-xia MO, Bing-guo CHANG, Guang SUN, Fei LONG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2015-03-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015083/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Verifiable multi-secret sharing schemes applicable to arbitrary access structures
by: ZHANG Fu-tai1, et al.
Published: (2007-01-01) -
Image visualization encryption algorithm based on Shamir threshold secret key sharing
by: Yifu TAN, et al.
Published: (2018-07-01) -
Tag dynamic ownership transfer protocol for multi-owner with weights
by: Yong GAN, et al.
Published: (2017-04-01) -
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
by: XU Jing-fang1, et al.
Published: (2009-01-01) -
Analysis of physical layer secret key capacity in the uniform scattering environment
by: Xu WANG, et al.
Published: (2016-09-01)