How to share a secret with cheaters
Journal of Cryptology
Communications of the ACM
Secret Sharing with Reusable Polynomials
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
Verifiable secret sharing and achieving simultaneity in the presence of faults
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
Research note: An on-line secret sharing scheme for multi-secrets
Computer Communications
An efficient threshold verifiable multi-secret sharing
Computer Standards & Interfaces
New efficient and practical verifiable multi-secret sharing schemes
Information Sciences: an International Journal
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves
Computer Communications
A novel verifiable dynamic multi-policy secret sharing scheme
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
An ideal multi-secret sharing scheme based on MSP
Information Sciences: an International Journal
A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
Wireless Personal Communications: An International Journal
Efficient (n, t, n) secret sharing schemes
Journal of Systems and Software
Verifiable multi-secret sharing based on LFSR sequences
Theoretical Computer Science
Security analysis and improvement of two verifiable multi-secret sharing schemes
International Journal of Security and Networks
Hi-index | 0.00 |
C.-C. Yang, T.-Y. Chang, M.-S. Hwang [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483-490] proposed an efficient multi-secret sharing scheme based on a two-variable one-way function in 2004. But the scheme doesn't have the property of verification. A practical verifiable multi-secret sharing scheme, which is based on the YCH scheme and the intractability of the discrete logarithm, is proposed in this paper. Our scheme solves the problems in the YCH scheme; each participant chooses her/his own shadow by her/himself, so the system doesn't need a security channel and the cost of the system can be lowered. The scheme can be used in practice widely.