Chi Sing Chum and Xiaowen Zhang Hash function-based secret sharing scheme designs Security and Communication Networks 6
With the cryptographic hash functions and the idea of the herding hash technique, we introduce a new construction for a (t + 1, n) threshold secret sharing scheme, which is ideal and perfect. The method, consisting of efficient setup and secret recovering, can be extended to realize any access structure. The scheme can be further implemented as proactive and verifiable effectively.
Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf