E-mail

E-mail a Wiley Online Library Link

Chi Sing Chum and Xiaowen Zhang Hash function-based secret sharing scheme designs Security and Communication Networks 6

Version of Record online: 21 JUN 2012 | DOI: 10.1002/sec.576

Thumbnail image of graphical abstract

With the cryptographic hash functions and the idea of the herding hash technique, we introduce a new construction for a (t + 1, n) threshold secret sharing scheme, which is ideal and perfect. The method, consisting of efficient setup and secret recovering, can be extended to realize any access structure. The scheme can be further implemented as proactive and verifiable effectively.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

SEARCH