JOURNAL ARTICLE

Information-theoretic secure verifiable secret sharing over RSA modulus

Gang QiuHong WangShimin WeiXiao Guo-zhen

Year: 2006 Journal:   Wuhan University Journal of Natural Sciences Vol: 11 (6)Pages: 1849-1852   Publisher: Springer Science+Business Media

Abstract

The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoretic verifiable secret sharing over RSA (Rivest, Shamir, Adleman) modulus and give the rigorous security proof. It is shown how to distribute a secret among a group such that any set ofk parties get no information about the secret. The presented scheme is generally applied to constructions of secure distributed multiplication and threshold or forward-secure signature protocols.

Keywords:
Verifiable secret sharing Secret sharing Shamir's Secret Sharing Homomorphic secret sharing Secure multi-party computation Theoretical computer science Computer science Construct (python library) Chinese remainder theorem Cryptography Computer security Scheme (mathematics) Mathematics Prime (order theory) Set (abstract data type) Algorithm Computer network Combinatorics

Metrics

2
Cited By
0.00
FWCI (Field Weighted Citation Impact)
8
Refs
0.20
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptography and Residue Arithmetic
Physical Sciences →  Computer Science →  Information Systems
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

BOOK-CHAPTER

Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing

Torben Pryds Pedersen

Lecture notes in computer science Year: 2007 Pages: 129-140
JOURNAL ARTICLE

Efficient and Information-Theoretical Secure Verifiable Secret Sharing Over Bilinear Groups

Futai ZhangJie Zhang

Journal:   Chinese Journal of Electronics Year: 2014 Vol: 23 (1)Pages: 13-17
JOURNAL ARTICLE

Polynomial Differential-Based Information-Theoretically Secure Verifiable Secret Sharing

Qassim Al Mahmoud

Journal:   International Journal of Information Technology and Computer Science Year: 2014 Vol: 6 (12)Pages: 18-23
JOURNAL ARTICLE

Unconditionally Secure Verifiable Secret Sharing Scheme

Changlu LinLein Harn

Journal:   INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences Year: 2012 Vol: 4 (17)Pages: 514-518
© 2026 ScienceGate Book Chapters — All rights reserved.