Results 1 to 10 of about 13,384 (274)
Essential Multi-Secret Image Sharing for Sensor Images [PDF]
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj +2 more sources
Publicly Verifiable Multi-stage Secret Sharing on General Access Structures [PDF]
A publicly verifiable secret sharing allows anyone to detect the cheating of dealer or participants only from the public information. In order to expand the application scope of multi-secret sharing, firstly, a publicly verifiable multi-stage secret ...
SONG Yun, WANG Ningning, XIAO Menglin, SHAO Zhiyi
doaj +1 more source
XOR-Based Meaningful (n, n) Visual Multi-Secrets Sharing Schemes
The basic visual cryptography (VC) model was proposed by Naor and Shamir in 1994. The secret image is encrypted into pieces, called shares, which can be viewed by collecting and directly stacking these shares.
Sheng-Yao Huang +2 more
doaj +1 more source
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve ...
Ruonan Shi +4 more
doaj +1 more source
Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex ...
Hongliang Cai, Dan Tang
doaj +1 more source
XOR-Based Progressively Secret Image Sharing
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily.
Cheng-Shian Lin +2 more
doaj +1 more source
Visual secret sharing and related Works -A Review [PDF]
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj +1 more source
Renewable Multi-secret Sharing of Self-selecting Sub-secret [PDF]
The existing public verifiable multi-secret sharing schemes without trusted centers can not make sub-secrets self-selected and periodical renewable simultaneously.In order to solve the problem,a public verifiable and renewable multi-secret sharing scheme
GU Ting,DU Weizhang
doaj +1 more source
Photonic quantum data locking [PDF]
Quantum data locking is a quantum phenomenon that allows us to encrypt a long message with a small secret key with information-theoretic security. This is in sharp contrast with classical information theory where, according to Shannon, the secret key ...
Zixin Huang +5 more
doaj +1 more source
Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang +3 more
doaj +1 more source

