Results 21 to 30 of about 13,572 (291)
Efficient Multi-Secret Digital Images Steganography [PDF]
The new conceptions of more than one secret message and false digital image steganography are presented in the current paper. One of the major ideas in these approaches is embodiment of more than one message in one container (digital image). The secrets that are hidden are known as real and false messages. The former one includes basic data that should
openaire +1 more source
Cryptographic techniques used to provide integrity of digital content in long-term storage [PDF]
The main objective of the project was to obtain advanced mathematical methods to guarantee the verification that a required level of data integrity is maintained in long-term storage.
John, Ockendon +9 more
core +1 more source
DNA Based Multi-secret Image Sharing
AbstractMultiple secret sharing algorithm using the YCH scheme, combined with DNA encoding is proposed, focusing at better security. Firstly, DNA encoding for multiple images is carried out; then the addition of these encoded components by DNA is performed.
Anbarasi, L. Jani +2 more
openaire +1 more source
An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj +1 more source
On the Communication Complexity of Secure Computation [PDF]
Information theoretically secure multi-party computation (MPC) is a central primitive of modern cryptography. However, relatively little is known about the communication complexity of this primitive.
A. Beimel +23 more
core +3 more sources
Dynamic Multi-secret Sharing Scheme in Vector Space Without Trusted Center [PDF]
The existing secret sharing scheme in the vector space cannot achieve the secret share update or the dynamic addition and deletion of members,and it is hard to ensure the existence of trusted center,so a multi-secret sharing scheme without trusted center
WANG Yuli,DU Weizhang
doaj +1 more source
(t,n) multi-secret sharing scheme extended from Harn-Hsu’s scheme
Multi-secret sharing scheme has been well studied in recent years. In most multi-secret sharing schemes, all secrets must be recovered synchronously; the shares cannot be reused any more.
Tong Zhang, Xizheng Ke, Yanxiao Liu
doaj +1 more source
Communication Efficient Secret Sharing [PDF]
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a threshold secret sharing scheme, a secret is encoded into $n$ shares, such that any set of at least $t_1$ shares suffice to decode the secret, and any set ...
Bruck, Jehoshua +3 more
core +4 more sources
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core +1 more source
Quantum communications can be conveniently implemented by two participants, but quantum secret key sharing (QSS) through multi-participant communication seems difficult in practice.
Yun Mao, Yiwu Zhu, Yijun Wang, Ying Guo
doaj +1 more source

