A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Three secret sharing schemes that use the Mignotte'ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) . The first scheme that uses the Mignotte's sequence is a single secret scheme; the second one is an extension of the first one to Multi-secret sharing scheme. The third scheme is again for the case of multi-secrets but it is an improvement over the seconddoi:10.24138/jcomss.v11i1.113 fatcat:d5ryslexjfc47br6nrekt4rn3e