Results 11 to 20 of about 13,572 (291)

Photonic quantum data locking [PDF]

open access: yesQuantum, 2021
Quantum data locking is a quantum phenomenon that allows us to encrypt a long message with a small secret key with information-theoretic security. This is in sharp contrast with classical information theory where, according to Shannon, the secret key ...
Zixin Huang   +5 more
doaj   +1 more source

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme

open access: yesIEEE Access, 2020
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang   +3 more
doaj   +1 more source

Boolean-Based (k, n, m) Multi-Secret Image Sharing

open access: yesAxioms, 2022
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property.
Chien-Chang Chen   +2 more
doaj   +1 more source

Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm

open access: yesEntropy, 2023
Reversible Data Hiding in Encrypted Image (RDHEI) is a technology for embedding secret information in an encrypted image. It allows the extraction of secret information and lossless decryption and the reconstruction of the original image.
Chi-Yao Weng, Cheng-Hsing Yang
doaj   +1 more source

Multi-Secret Sharing Schemes [PDF]

open access: yes, 1994
A multi-secret sharing scheme is a protocol to share m arbitrarily related secrets s1,..., sm among a set of participants P. In this paper we put forward a general theory of multi-secret sharing schemes by using an information theoretical framework. We prove lower bounds on the size of information held by each participant for various access structures.
Carlo Blundo   +4 more
openaire   +1 more source

Data Hiding of Multicompressed Images Based on Shamir Threshold Sharing

open access: yesApplied Sciences, 2022
Image-based data hiding methods have been used in the development of various applications in computer vision. At present, there are two main types of data hiding based on secret sharing, namely dual-image data hiding and multi-image data hiding.
Haoyang Kang, Lu Leng, Byung-Gyu Kim
doaj   +1 more source

Privacy-Preserving Determination of Secret Interval and Threshold

open access: yesJisuanji kexue yu tansuo, 2020
Secure multi-party computation (SMC) is a research hotspot in cryptography in recent years, and is also a key technology for information security protection.
CHENG Wen, LI Shundong, WANG Wenli
doaj   +1 more source

New results and applications for multi-secret sharing schemes [PDF]

open access: yes, 2014
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some set , each one according to an access structure. The trivial solution to this problem is to run independent instances of a standard secret sharing scheme,
Herranz Sotoca, Javier   +2 more
core   +2 more sources

Multi-Hider Reversible Data Hiding Using a Weighted Color Transfer and Modulus Operation

open access: yesApplied Sciences, 2023
This paper proposes a multi-hider dual-image reversible data-hiding algorithm. Generating dual stego images, the proposed algorithm provides a high embedding capacity, exhibits high image quality, offers reversibility to restore the stego images, and ...
Ku-Sung Hsieh, Chung-Ming Wang
doaj   +1 more source

Secure secret sharing in the cloud [PDF]

open access: yes, 2017
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core   +1 more source

Home - About - Disclaimer - Privacy