>
Fa   |   Ar   |   En
   security analysis of a hash-based secret sharing scheme  
   
نویسنده farhadi majid ,baypoor hamideh ,mortazavi reza
منبع analytical and numerical solutions for nonlinear equations - 2016 - دوره : 1 - شماره : 2 - صفحه:93 -100
چکیده    Secret sharing schemes perform an important role in protecting secret by sharing it among multiple participants. in 1979, (t, n) threshold secret sharing schemes were proposed by shamir and blakley independently. in a (t, n) threshold secret sharing scheme a secret can be shared among n participants such that t or more participants can reconstruct the secret, but it can not be reconstructed by t - 1 or fewer participants. the proposed schemes by shamir and blakley have some drawbacks. multisecret and verifiable schemes were invented to improve old schemes. we analysis the security of hash basedsecret sharing schemes, and show that the schemes have some drawbacks. in particular it is shown that the the schemes are not resistant against deceptive behavior by dealer and participants.
کلیدواژه secret sharing schemes ,minimal authorized subsets ,cheating
آدرس damghan university, school of mathematics and computer science, ایران, damghan university, school of mathematics and computer science, ایران, damghan university, school of engineering, ایران
پست الکترونیکی r_mortazavi@du.ac.ir
 
   عنوان  
   
Authors
  
 
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved