Browsing by Subject "Threshold cryptosystem"
Now showing items 1-2 of 2
(Springer Verlag, 2009)
Open AccessIn a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a differ- ent associated access structure. We consider here unconditionally secure schemes with ...
Restricted access - publisher's policyIn this paper we propose a new publicly verifiable secret sharing scheme using pairings with close relations to Shoenmakers’ scheme. This scheme is efficient, multiplicatively homomorphic and with unconditional verifiability ...