Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem [PDF]
The reversible extended secret image sharing (RESIS) scheme can safely segment the secret image into a shadow image and embed it into the cover image, while ensuring that both the secret image and the cover image are completely restored.
Chaoying Wang +5 more
doaj +2 more sources
Multi-Tone Frequency Estimation Based on the All-Phase Discrete Fourier Transform and Chinese Remainder Theorem [PDF]
The closed-form robust Chinese Remainder Theorem (CRT) is a powerful approach to achieve single-frequency estimation from noisy undersampled waveforms. However, the difficulty of CRT-based methods’ extension into the multi-tone case lies in the fact it ...
Xiangdong Huang, Lu Cao, Wei Lu
doaj +2 more sources
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem [PDF]
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue.
Eun-Suk Cho +3 more
doaj +2 more sources
A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes [PDF]
Security and efficiency are the two main challenges for designing a smart home system. In this paper, by incorporating Chinese remainder theorem (CRT) into the elliptic curve Diffie−Hellman (ECDH), a lightweight key agreement protocol for smart ...
Yi Jiang, Yong Shen, Qingyi Zhu
doaj +2 more sources
Secure Data Aggregation in Wireless Sensor Network using Chinese Remainder Theorem [PDF]
A new method of lossless Secure Data Aggregation for Wireless Sensor Network is presented. Secure Data Aggregation is achieved using the popular Chinese Remainder theorem.
Sanu Thomas, Thomaskutty Mathew
doaj +1 more source
Practical Secret Image Sharing Based on the Chinese Remainder Theorem
Compared with Shamir’s original secret image sharing (SIS), the Chinese-remainder-theorem-based SIS (CRTSIS) generally has the advantages of a lower computation complexity, lossless recovery and no auxiliary encryption. However, general CRTSIS is neither
Longlong Li +4 more
doaj +1 more source
A Secret Image Sharing Based on Logistic-Chebyshev Chaotic Map and Chinese Remainder Theorem [PDF]
Visual secret sharing (VSS) was introduced in order to solve information security issues. It is a modern cryptographic technique. It involves breaking up a secret image into $n$ secured components known as shares.
Asmaa Hilmi +2 more
doaj +1 more source
A Chinese Remainder Theorem for partitions
AbstractLet s, t be natural numbers and fix an s-core partition $$\sigma $$ σ and a t-core partition $$\tau $$ τ . Put $$d=\gcd (s,t)$$ d = gcd ( s
Kayanattath Seethalakshmi +1 more
openaire +3 more sources
Research and design of CRT-based homomorphic ciphertext database system
The cloud’s storage and query of private information have the cryptographic scholar due to the proliferation of cloud computing. In the traditional query mode, the private information stored in the cloud is at risk of being leaked. In order to solve this
De Zhao +4 more
doaj +1 more source
New results on multidimensional Chinese remainder theorem [PDF]
The Chinese remainder theorem (CRT) [McClellan and Rader 1979] has been well known for applications in fast DFT computations and computer arithmetic.
Lin, Yuan-Pei +2 more
core +1 more source

