Implementations of a Hash Function Based Secret Sharing Scheme
2015
Secret sharing scheme creates an effective method to safeguard a secret by dividing it among several participants. By using cryptographic hash functions and the herding hashes technique, Chum and Zhang proposed a simple and efficient secret sharing scheme. In this article, we implement such scheme by several examples, namely, a general (t, n) threshold scheme, a one-weighted (t, n) threshold scheme, a multisecret scheme, a verifiable (t, n) threshold scheme, and a proactive scheme. We conduct a performance comparison study and find that the hash-based threshold scheme setup is two times, and secret recovery is six times faster than Shamir threshold scheme.
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
11
References
2
Citations
NaN
KQI