Results 21 to 30 of about 13,384 (274)

DNA Based Multi-secret Image Sharing

open access: yesProcedia Computer Science, 2015
AbstractMultiple secret sharing algorithm using the YCH scheme, combined with DNA encoding is proposed, focusing at better security. Firstly, DNA encoding for multiple images is carried out; then the addition of these encoded components by DNA is performed.
Anbarasi, L. Jani   +2 more
openaire   +1 more source

An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages

open access: yesIEEE Access, 2019
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj   +1 more source

On the Communication Complexity of Secure Computation [PDF]

open access: yes, 2014
Information theoretically secure multi-party computation (MPC) is a central primitive of modern cryptography. However, relatively little is known about the communication complexity of this primitive.
A. Beimel   +23 more
core   +3 more sources

Dynamic Multi-secret Sharing Scheme in Vector Space Without Trusted Center [PDF]

open access: yesJisuanji gongcheng, 2017
The existing secret sharing scheme in the vector space cannot achieve the secret share update or the dynamic addition and deletion of members,and it is hard to ensure the existence of trusted center,so a multi-secret sharing scheme without trusted center
WANG Yuli,DU Weizhang
doaj   +1 more source

(t,n) multi-secret sharing scheme extended from Harn-Hsu’s scheme

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
Multi-secret sharing scheme has been well studied in recent years. In most multi-secret sharing schemes, all secrets must be recovered synchronously; the shares cannot be reused any more.
Tong Zhang, Xizheng Ke, Yanxiao Liu
doaj   +1 more source

Communication Efficient Secret Sharing [PDF]

open access: yes, 2015
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a threshold secret sharing scheme, a secret is encoded into $n$ shares, such that any set of at least $t_1$ shares suffice to decode the secret, and any set ...
Bruck, Jehoshua   +3 more
core   +4 more sources

Continuous Variable Quantum Secret Sharing with Security Enhancement in Practical Quantum Communications

open access: yesMathematics, 2022
Quantum communications can be conveniently implemented by two participants, but quantum secret key sharing (QSS) through multi-participant communication seems difficult in practice.
Yun Mao, Yiwu Zhu, Yijun Wang, Ying Guo
doaj   +1 more source

An ECDLP-Based Verifiable Multi-Secret Sharing Scheme [PDF]

open access: yesMathematics Interdisciplinary Research, 2020
‎‎Secret sharing is an important issue in cryptography which has many applications‎. ‎In a secret sharing scheme‎, ‎a secret is shared by a dealer among several participants in such a way that any authorized subset of participants can recover the secret ...
Khadijeh Eslami, Mojtaba Bahramian
doaj   +1 more source

Improved Multi-secret Sharing Scheme Based on One-Way Function [PDF]

open access: yes, 2014
The weakness He-Dawson’s threshold multi-secret sharing scheme is presented and analyzed. By using the one-way function thought in the He-Dawson scheme, a new multi-use and multi-secret sharing scheme is proposed. The improved scheme is multi-time-use of
Li-Zheng, Guo   +2 more
core   +2 more sources

Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations

open access: yesInternational Journal of Distributed Sensor Networks, 2022
Wireless sensor network is a key technology in the sensing layer of the Internet of Things. Data security in wireless sensor network is directly related to the authenticity and validity of data transmitted in the Internet of Things.
Yan Lin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy