|
计算机应用研究 2010
Two practical verifiable multi-secret sharing schemes
|
Abstract:
This paper proposed two verifiable multi-secret sharing schemes based on the homogeneous linear recursion technique. In the schemes, the participants chose their own secret shares which not only decreased the computational cost of the dealer but also avoid the using of security channel. Compared with the two recent similar schemes, the schemes had advantages on public values and computational cost. Security analysis shows that the schemes can resist to the attacks available.