Secret sharing using the Chinese remainder theorem

Results: 6



#Item
1Secret sharing / Verifiable secret sharing / XTR / Secret sharing using the Chinese remainder theorem / Cryptography / Cryptographic protocols / Key management

An ideal multi-secret sharing scheme based on minimal privileged coalitions Yun Song , Zhihui Li ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-24 06:38:57
2Finite fields / Key management / Secret sharing / Linear code / Algebraic geometry / Secure multi-party computation / RSA / Secret sharing using the Chinese remainder theorem / Verifiable secret sharing / Cryptography / Cryptographic protocols / Coding theory

Secure Computation from Random Error Correcting Codes Hao Chen1 , Ronald Cramer2 , Shafi Goldwasser3 , Robbert de Haan4 , and Vinod Vaikuntanathan5 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:27
3Public-key cryptography / Secret sharing / Verifiable secret sharing / Chinese remainder theorem / RSA / Publicly Verifiable Secret Sharing / Q / XTR / Secret sharing using the Chinese remainder theorem / Cryptography / Modular arithmetic / Commutative algebra

Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes Daniel Pasail˘a, Vlad Alexa, Sorin Iftene

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-01 13:36:48
4Commutative algebra / Key management / Secret sharing / Secret sharing using the Chinese remainder theorem / Public-key cryptography / Chinese remainder theorem / RSA / Cryptography / Modular arithmetic / Cryptographic protocols

doi:[removed]j.entcs[removed]

Add to Reading List

Source URL: www.fatih.edu.tr

Language: English - Date: 2012-04-06 09:39:19
5XTR / Algebra / Projection / Matrix / Numerical analysis / Secret sharing using the Chinese remainder theorem / Griesmer bound / Mathematical analysis / Mathematics / Functional analysis

IEEE TRANSACTIONS ON INFORMATION

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:41:04
6Secret sharing / Scheme theory / Access structure / Scheme / Verifiable secret sharing / Secret sharing using the Chinese remainder theorem / Cryptography / Cryptographic protocols / Key management

PDF Document

Add to Reading List

Source URL: www.cs.bgu.ac.il

Language: English - Date: 2011-02-28 08:41:34
UPDATE