Results 1 to 10 of about 10,131 (178)

A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes [PDF]

open access: yesSensors, 2020
Security and efficiency are the two main challenges for designing a smart home system. In this paper, by incorporating Chinese remainder theorem (CRT) into the elliptic curve Diffie−Hellman (ECDH), a lightweight key agreement protocol for smart ...
Yi Jiang, Yong Shen, Qingyi Zhu
doaj   +3 more sources

Multiparty weighted threshold quantum secret sharing based on the Chinese remainder theorem to share quantum information. [PDF]

open access: yesSci Rep, 2021
Secret sharing is a widely-used security protocol and cryptographic primitive in which all people cooperate to restore encrypted information. The characteristics of a quantum field guarantee the security of information; therefore, many researchers are ...
Chou YH, Zeng GJ, Chen XY, Kuo SY.
europepmc   +2 more sources

A Secret Image Sharing Based on Logistic-Chebyshev Chaotic Map and Chinese Remainder Theorem [PDF]

open access: yesComputer Science Journal of Moldova, 2023
Visual secret sharing (VSS) was introduced in order to solve information security issues. It is a modern cryptographic technique. It involves breaking up a secret image into $n$ secured components known as shares.
Asmaa Hilmi   +2 more
doaj   +2 more sources

Practical Secret Image Sharing Based on the Chinese Remainder Theorem

open access: yesMathematics, 2022
Compared with Shamir’s original secret image sharing (SIS), the Chinese-remainder-theorem-based SIS (CRTSIS) generally has the advantages of a lower computation complexity, lossless recovery and no auxiliary encryption. However, general CRTSIS is neither
Longlong Li   +4 more
doaj   +2 more sources

Exact and Robust Reconstructions of Integer Vectors Based on Multidimensional Chinese Remainder Theorem (MD-CRT). [PDF]

open access: yesIEEE Trans Signal Process, 2020
The robust Chinese remainder theorem (CRT) has been recently proposed for robustly reconstructing a large nonnegative integer from erroneous remainders.
Xiao L, Xia XG, Wang YP.
europepmc   +2 more sources

Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks

open access: yesApplied Sciences, 2022
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs ...
Mahmood A. Al-Shareeda   +3 more
doaj   +2 more sources

Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem [PDF]

open access: yesHeliyon, 2023
The reversible extended secret image sharing (RESIS) scheme can safely segment the secret image into a shadow image and embed it into the cover image, while ensuring that both the secret image and the cover image are completely restored.
Chaoying Wang   +5 more
doaj   +2 more sources

Multi-Tone Frequency Estimation Based on the All-Phase Discrete Fourier Transform and Chinese Remainder Theorem [PDF]

open access: yesSensors, 2020
The closed-form robust Chinese Remainder Theorem (CRT) is a powerful approach to achieve single-frequency estimation from noisy undersampled waveforms. However, the difficulty of CRT-based methods’ extension into the multi-tone case lies in the fact it ...
Xiangdong Huang, Lu Cao, Wei Lu
doaj   +2 more sources

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem [PDF]

open access: yesSensors, 2010
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue.
Eun-Suk Cho   +3 more
doaj   +2 more sources

An Efficient Multi-Secret Image Sharing System Based on Chinese Remainder Theorem and Its FPGA Realization

open access: yesIEEE Access, 2023
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants.
Bishoy K. Sharobim   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy