Results 221 to 230 of about 10,250 (292)

A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem

Information Sciences, 2019
A general (t, n) secret sharing (SS) scheme with fixed threshold allows a secret to be shared without considering the time dynamic nature of the security environment.
Xingxing Jia   +4 more
semanticscholar   +3 more sources

Frequency determination from truly sub-Nyquist samplers based on robust Chinese remainder theorem

Signal Processing, 2018
In this paper, a truly sub-Nyquist sampling method for frequency estimation of sinusoidal signals in noise is presented. Basically speaking, sinusoidal signals are first sampled at multiple sampling rates lower than the Nyquist rate, and then a robust ...
Li Xiao, X. Xia
semanticscholar   +3 more sources

A Privacy-Preserving Data Aggregation Scheme Based on Chinese Remainder Theorem in Mobile Crowdsensing System

IEEE Systems Journal, 2023
Mobile crowdsensing provides a large-scale reliable data, since sensing nodes support wide distribution, flexible mobility, and opportunistic connectivity. The generated data often contains the sensing node's sensitive information.
Boyao Zhu   +3 more
semanticscholar   +1 more source

EF-CRT: Group Key Update and Batch Verification Based on Euler Function and Chinese Remainder Theorem for Edge-Fog Computing Networks

IEEE Systems Journal, 2023
In edge-fog computing networks, it is very crucial to ensure that group keys are secure and reliable. In recent years, there has been much interest in group key updating schemes based on Chinese remainder theorem (CRT).
Shu-Lin Wu, Aiqing Zhang, Huining Luo
semanticscholar   +1 more source

Meaningful Shares based Single Secret Sharing Scheme using Chinese Remainder Theorem and XOR Operation

SPIN, 2023
Secret-sharing techniques have become increasingly sophisticated over the years and now focus on generating random shares. These shares do not provide an attacker with any confidential information, however, the randomness of the shares can be suspicious.
A. Rawat, Maroti Deshmukh, Maheep Singh
semanticscholar   +1 more source

Cryptanalysis on Polynomial Congruence-Based Public Key with Chinese Remainder Theorem

2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), 2023
Public key cryptography is an asymmetric cryptographic scheme that consists of two key pairs: a public key, which is publicly known, and a private key, which is kept secret.
Ikhwanul Hakim Masri, B. H. Susanti
semanticscholar   +1 more source

A Novel Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder Theorem

International Conference on Mobile Ad-hoc and Sensor Networks, 2022
In wireless sensor networks (WSNs), to improve sensing accuracy and coverage, a large number of sensor nodes are usually deployed in the monitoring area.
Jinxin Zhang, Fuyou Miao
semanticscholar   +1 more source

A reversible extended secret image sharing scheme based on Chinese remainder theorem

Signal processing. Image communication, 2021
In a secret image sharing (SIS) scheme, a secret image is divided into n shadow images. Then, any t or more shadow images can recover the secret image.
Keju Meng   +3 more
semanticscholar   +1 more source

Chinese Remainder Theorem-based Essential Secret Image Sharing

2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021
It is well known that the shares generated by most secret image sharing (SIS) schemes are of equal importance. However, in some essential SIS (ESIS) schemes, the generated shares are divided into two groups of different importance. The shares in the more
Zuquan Liu, Jianquan Yang, Guopu Zhu
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy