مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

385
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme

Pages

  101-115

Abstract

 In this paper, we present two verifiable multi-Secret Sharing schemes, including a linear multi-Secret Sharing scheme with public access structure and a threshold (t, n) scheme based on the learning with errors (LWE) problem. The first scheme is a linear multi-Secret Sharing scheme in which a number of secrets is distributed by a dealer among a set of participants according to the access structure corresponding to each secret. This scheme has the advantages of the earlier ones and it also has many practical applications compared to previous schemes including a multi-use verifiable multi-Secret Sharing scheme in which the secret reconstruction is according to the dealer’ s preassigned order. In addition, the security of the scheme has been proven in the standard model. This scheme is based on the hard problems in number theory and therefore is not secure against quantum attacks. The second scheme presented in this paper is a Lattice-based Secret Sharing scheme. In this scheme, which is a threshold (t, n) multi-Secret Sharing scheme, the presence of at least t participants is required for the reconstruction of the secret. The security of this scheme is based on the difficulty of the LWE Problem and so it is resistant against quantum attacks.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Hadian Dehkordi, m., MASHHADI, S., & Kiamari, N.. (2020). Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme. JOURNAL OF ELECTRONIC AND CYBER DEFENCE, 8(3 (31) ), 101-115. SID. https://sid.ir/paper/405134/en

    Vancouver: Copy

    Hadian Dehkordi m., MASHHADI S., Kiamari N.. Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme. JOURNAL OF ELECTRONIC AND CYBER DEFENCE[Internet]. 2020;8(3 (31) ):101-115. Available from: https://sid.ir/paper/405134/en

    IEEE: Copy

    m. Hadian Dehkordi, S. MASHHADI, and N. Kiamari, “Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme,” JOURNAL OF ELECTRONIC AND CYBER DEFENCE, vol. 8, no. 3 (31) , pp. 101–115, 2020, [Online]. Available: https://sid.ir/paper/405134/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button