A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes [PDF]
Security and efficiency are the two main challenges for designing a smart home system. In this paper, by incorporating Chinese remainder theorem (CRT) into the elliptic curve Diffie−Hellman (ECDH), a lightweight key agreement protocol for smart ...
Yi Jiang, Yong Shen, Qingyi Zhu
doaj +3 more sources
Multiparty weighted threshold quantum secret sharing based on the Chinese remainder theorem to share quantum information. [PDF]
Secret sharing is a widely-used security protocol and cryptographic primitive in which all people cooperate to restore encrypted information. The characteristics of a quantum field guarantee the security of information; therefore, many researchers are ...
Chou YH, Zeng GJ, Chen XY, Kuo SY.
europepmc +2 more sources
A Secret Image Sharing Based on Logistic-Chebyshev Chaotic Map and Chinese Remainder Theorem [PDF]
Visual secret sharing (VSS) was introduced in order to solve information security issues. It is a modern cryptographic technique. It involves breaking up a secret image into $n$ secured components known as shares.
Asmaa Hilmi +2 more
doaj +2 more sources
Practical Secret Image Sharing Based on the Chinese Remainder Theorem
Compared with Shamir’s original secret image sharing (SIS), the Chinese-remainder-theorem-based SIS (CRTSIS) generally has the advantages of a lower computation complexity, lossless recovery and no auxiliary encryption. However, general CRTSIS is neither
Longlong Li +4 more
doaj +2 more sources
Exact and Robust Reconstructions of Integer Vectors Based on Multidimensional Chinese Remainder Theorem (MD-CRT). [PDF]
The robust Chinese remainder theorem (CRT) has been recently proposed for robustly reconstructing a large nonnegative integer from erroneous remainders.
Xiao L, Xia XG, Wang YP.
europepmc +2 more sources
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs ...
Mahmood A. Al-Shareeda +3 more
doaj +2 more sources
Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem [PDF]
The reversible extended secret image sharing (RESIS) scheme can safely segment the secret image into a shadow image and embed it into the cover image, while ensuring that both the secret image and the cover image are completely restored.
Chaoying Wang +5 more
doaj +2 more sources
Multi-Tone Frequency Estimation Based on the All-Phase Discrete Fourier Transform and Chinese Remainder Theorem [PDF]
The closed-form robust Chinese Remainder Theorem (CRT) is a powerful approach to achieve single-frequency estimation from noisy undersampled waveforms. However, the difficulty of CRT-based methods’ extension into the multi-tone case lies in the fact it ...
Xiangdong Huang, Lu Cao, Wei Lu
doaj +2 more sources
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem [PDF]
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue.
Eun-Suk Cho +3 more
doaj +2 more sources
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants.
Bishoy K. Sharobim +5 more
doaj +2 more sources

