Previous Articles Next Articles
DING Jian^{1,2}, KE Pinhui^{3}, LIN Changlu^{3}, WANG Huaxiong^{4}
DING Jian, KE Pinhui, LIN Changlu, WANG Huaxiong. Ramp Scheme Based on CRT for Polynomial Ring over Finite Field[J]. Journal of Systems Science and Complexity, 2023, 36(1): 129150.
[1] Blakley G R, Safeguarding cryptographic keys, Proceedings of the National Computer Conference'1979, AFIPS Proceedings, 1979, 48:313317. [2] Shamir A, How to share a secret, Communications of the ACM, 1979, 22(11):612613. [3] Asmuth C and Bloom J, A modular approach to key safeguarding, IEEE Trans. Inf. Theory, 1983, 29(2):208210. [4] Harn L and Miao F, Weighted secret sharing based on the Chinese Remainder Theorem, Int. Netw. Secur., 2014, 16(6):420425. [5] Harn L and Miao F, Multilevel threshold secret sharing based on the Chinese Remainder Theorem, Inf. Process. Lett., 2014, 114(9):504509. [6] Liu Y, Harn L, and Chang C C, A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets, Int. J. Commun. Syst., 2015, 28(7):12821292. [7] Blakley G R and Meadows C, Security of ramp schemes, Eds. by Blakley G R, Chaum D. Advances in CryptologyCRYPTO 1984, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 1985, 196:242268. [8] Huang W, Langberg M, Kliewer J, et al., Communication efficient secret sharing, IEEE Trans. Inf. Theory, 2016, 62(12):71957206. [9] Ning Y, Miao F, Huang W, et al., Constructing ideal secret sharing schemes based on Chinese Remainder Theorem, Eds. by Peyrin T, Galbraith S. Advances in CryptologyASIACRYPT 2018, Lecture Notes in Computer Science, Springer, Cham, 2018, 11274:310331. [10] Martin K M, Pieprzyk J, SafaviNaini R, et al., Changing thresholds in the absence of secure channels, Information Security and Privacy, ACISP 1999, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 1999, 1587:177191. [11] Wang H and Wong D S, On secret reconstruction in secret sharing schemes, IEEE Trans. Inf. Theory, 2008, 54(1):473480. [12] Zhang Z, Chee Y M, Ling S, et al., Threshold changeable secret sharing schemes revisited, Theor. Compu. Sci., 2012, 418:106115. [13] Bitar R and Rouayheb S E, Staircase codes for secret sharing with optimal communication and read overheads, IEEE Trans. Inf. Theory, 2018, 64(6):41914206. [14] Lin F, Ling S, Wang H, et al., Threshold changeable ramp secret sharing, Eds. by Mu Y, Deng R, Huang X. Cryptology and Network Security, CANS 2019, Lecture Notes in Computer Science, Springer, Cham, 2019, 11829:308327. [15] Steinfeld R, Pieprzyk J, and Wang H, Latticebased thresholdchangeability for standard crt secretsharing schemes, Finite Fields Their Appl., 2006, 12(4):653680. [16] Steinfeld R, Pieprzyk J, and Wang H, Latticebased threshold changeability for standard shamir secretsharing schemes, IEEE Trans. Inf. Theory, 2007, 53(7):25422559. [17] Ding J, Lin C, and Lin F, Optimal threshold changeable secret sharing with new threshold change range, Eds. by Nguyen K, et al., ProvSec 2020, LNCS, 2020, 12505:361378. [18] Harn L, Group authentication, IEEE Trans. Comput., 2013, 62(9):18931898. [19] Harn L, Secure secret reconstruction and multisecret sharing schemes with unconditional security, Security Comm. Networks, 2014, 7(3):567573. [20] Harn L and Hsu C F, Dynamic threshold secret reconstruction and its application to the threshold cryptography, Inf. Process. Lett., 2015, 115(11):851857. [21] Jamshidpour S and Ahmadian Z, Security analysis of a dynamic threshold secret sharing scheme using linear subspace method, Inf. Process. Lett., 2020, 163:105994. [22] Ahmadian Z and Jamshidpour S, Linear subspace cryptanalysis of a secret sharingbased group authentication scheme, IEEE Trans. Inf. Forensics Secur., 2019, 13(2):502510. [23] Jia X, Wang D, Nie D, et al., A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem, Inf. Sci., 2019, 47:313330. [24] Lang S, Algebra, Graduate Texts in Mathematics, 3rd Ed., Springer, New York, vol. 211, 2002. [25] Cohen H, A Course in Algorithmic Algebraic Number Theory, Springer, Heidelberg, vol. 138. 1993. [26] Stinson D R, Cryptography, Theory and Practice, 3rd Ed., Chapman and Hall/CRC, Boca Raton, 2006. 
[1]  SUN Yao,HUANG Zhenyu,LIN Dongdai,WANG Dingkang. On Implementing the Symbolic Preprocessing Function over Boolean Polynomial Rings in Gr¨obner Basis Algorithms Using Linear Algebra [J]. Journal of Systems Science and Complexity, 2016, 29(3): 789804. 
Viewed  
Full text 


Abstract 

