Title: Implementations of a Hash Function Based Secret Sharing Scheme
Abstract: Secret sharing scheme creates an effective method to safeguard a secret by dividing it among several participants. By using cryptographic hash functions and the herding hashes technique, Chum and Zhang proposed a simple and efficient secret sharing scheme. In this article, we implement such scheme by several examples, namely, a general (t, n) threshold scheme, a one-weighted (t, n) threshold scheme, a multisecret scheme, a verifiable (t, n) threshold scheme, and a proactive scheme. We conduct a performance comparison study and find that the hash-based threshold scheme setup is two times, and secret recovery is six times faster than Shamir threshold scheme.
Publication Year: 2015
Publication Date: 2015-07-20
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 3
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot