Basic Shamir [11] |
|
|
Decentralized |
Ulutas et al. [17] |
Secure distribution of shares of medical images.
No verification of secret shares.
(t − n) threshold protocol.
|
|
Decentralized |
Harn et al. [20] |
Support a verifiable secret sharing method based on the CRT.
Using Asmuth–Bloom’s scheme.
It does not require a secure channel.
|
|
Centralized |
Liu et al. [21] |
|
|
Centralized |
Liu et al. [22] |
Unconditionally secure.
Using Chinese Reminder Theorem, Shamir’s Secret Sharing, and Asmuth-secret Bloom’s sharing.
Support key authentication using a one-way hash function.
|
|
Centralized |
Meng et al. [28] |
|
|
Centralized |
Liu et al. [29] |
|
|
Centralized |