Results 31 to 40 of about 13,572 (291)
An ECDLP-Based Verifiable Multi-Secret Sharing Scheme [PDF]
Secret sharing is an important issue in cryptography which has many applications. In a secret sharing scheme, a secret is shared by a dealer among several participants in such a way that any authorized subset of participants can recover the secret ...
Khadijeh Eslami, Mojtaba Bahramian
doaj +1 more source
Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations
Wireless sensor network is a key technology in the sensing layer of the Internet of Things. Data security in wireless sensor network is directly related to the authenticity and validity of data transmitted in the Internet of Things.
Yan Lin +3 more
doaj +1 more source
Identifiable Tampering Multi-Carrier Image Information Hiding Algorithm Based on Compressed Sensing
Aiming at the security problem of secret information preprocessing and the difficulty of improving the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering multi-carrier image information hiding ...
Shuai Ren +3 more
doaj +1 more source
Verifiable multi-secret sharing schemes applicable to arbitrary access structures
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj +2 more sources
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea +1 more
doaj +1 more source
Secret Sharing for Cloud Data Security
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya +2 more
core +1 more source
Periodical Multi-secret Threshold Cryptosystems [PDF]
A periodical multi-secret threshold cryptosystem enables a sender to encrypt a message by using a cyclical sequence of keys which are shared by n parties and periodically updated. The same keys appear in the same order in each cycle, and thus any subset of t+1 parties can decrypt the message only in the periodical time-frames, while no subset of t ...
openaire +1 more source
Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images [PDF]
[[abstract]]A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified ...
[[corresponding]]Chen, Chien-Chang +1 more
core +1 more source
Conjunctive Hierarchical Multi-Secret Sharing Scheme using Elliptic Curves
In the present paper, the authors provide a conjunctive hierarchical multi-secret sharing scheme using elliptic curves and bilinear pairings. The scheme distributes several secrets among users grouped in hierarchical levels, where only authorized subsets of users from each level can collaborate to reconstruct the secrets.
Chintamani, Mohan +2 more
openaire +1 more source
An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core

