Welcome to Asecuritysite.com
Home
Index
Cipher
Blogs
IP
IDS
Magic
Net
Cisco
Cyber
Test
Fun
Subj
About
Secret shares and threshold encryption
[
Subjects Home
][
Home
]
The following defines some secret shares and threshold encryption.
Shamir secret share
The following are the tips related to associated material:
Shamir Secret Shares with Go
.
SSS
. Creating Secret Shares.
Shamir's Secret Sharing (creator)
.
Shamir
.
Shamir's Secret Sharing (decrypt)
.
Shamir
.
Shamir's Secret Sharing (Python)
.
Secret shares
.
Shamir's Secret Sharing example (Python Numpy)
.
Secret shares
.
Proactive Secret Sharing example (Python Numpy)
.
Secret shares
.
SIKE Secret Shares with Go
.
SIKE
. Post-quantum key exchange with key encapulation.
Secret shares in Rust
.
Secret shares
. Secret shares in Rust.
Chinese Remainder Theory and Blakley
The following are the tips related to associated material:
Secret Shares With Chinese Remainder Theory (CRT)
.
Secret shares (CRT)
. This example uses the Asmuth-Bloom threshold secret share scheme.
Secret Shares With Chinese Remainder Theory (CRT)
.
Secret shares (CRT)
. This example uses the Mignotte threshold secret sharing scheme.
Secret Shares With Blakley method)
.
Secret shares (Blakley)
. This example uses the Blakley threshold secret sharing scheme.
RSA and ECC
The following are the tips related to associated material:
RSA Secret Shares with Python
.
RSA
. Creating Secret Shares in RSA.
ECC threshold encryption
.
ECC
.
BLS and ECDSA
The following are the tips related to associated material:
(t,n)-threshold Boneh-Lynn-Shacham (BLS) signature scheme
.
TBLS
. Create n shares and where we need to get t back to verify the signature.
Secret shares with ECDSA
.
ECDSA Secret shares
. Secret shares in ECDSA.
Post quantum
SIKE Secret Shares with Go
.
SIKE
. Post-quantum key exchange with key encapulation.
Presentations