Results 31 to 40 of about 13,384 (274)

Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images [PDF]

open access: yes, 2013
[[abstract]]A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified ...
[[corresponding]]Chen, Chien-Chang   +1 more
core   +1 more source

Identifiable Tampering Multi-Carrier Image Information Hiding Algorithm Based on Compressed Sensing

open access: yesIEEE Access, 2020
Aiming at the security problem of secret information preprocessing and the difficulty of improving the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering multi-carrier image information hiding ...
Shuai Ren   +3 more
doaj   +1 more source

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]

open access: yes, 2016
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core   +1 more source

Verifiable multi-secret sharing schemes applicable to arbitrary access structures

open access: yesTongxin xuebao, 2007
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj   +2 more sources

Periodical Multi-secret Threshold Cryptosystems [PDF]

open access: yes, 1999
A periodical multi-secret threshold cryptosystem enables a sender to encrypt a message by using a cyclical sequence of keys which are shared by n parties and periodically updated. The same keys appear in the same order in each cycle, and thus any subset of t+1 parties can decrypt the message only in the periodical time-frames, while no subset of t ...
openaire   +1 more source

Secret Sharing for Cloud Data Security

open access: yes, 2017
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya   +2 more
core   +1 more source

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

open access: yesIET Information Security, 2021
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea   +1 more
doaj   +1 more source

Conjunctive Hierarchical Multi-Secret Sharing Scheme using Elliptic Curves

open access: yesIndian Journal of Pure and Applied Mathematics, 2023
In the present paper, the authors provide a conjunctive hierarchical multi-secret sharing scheme using elliptic curves and bilinear pairings. The scheme distributes several secrets among users grouped in hierarchical levels, where only authorized subsets of users from each level can collaborate to reconstruct the secrets.
Chintamani, Mohan   +2 more
openaire   +1 more source

An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]

open access: yes, 2012
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core   +1 more source

Updating the parameters of a threshold scheme by minimal broadcast [PDF]

open access: yes, 2005
Threshold schemes allow secret data to be protected among a set of participants in such a way that only a prespecified threshold of participants can reconstruct the secret from private information (shares) distributed to them on a system setup using ...
Barwick, S., Jackson, W., Martin, K.
core   +1 more source

Home - About - Disclaimer - Privacy