Results 1 to 10 of about 211,108 (260)

Essential Multi-Secret Image Sharing for Sensor Images [PDF]

open access: yesJournal of Imaging
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj   +2 more sources

Implementing Quantum Secret Sharing on Current Hardware [PDF]

open access: yesEntropy
Quantum secret sharing is a cryptographic scheme that enables the secure storage and reconstruction of quantum information. While the theory of secret sharing is mature in its development, relatively few studies have explored the performance of quantum ...
Jay Graves, Mike Nelson, Eric Chitambar
doaj   +2 more sources

An ECDLP-Based Verifiable Multi-Secret Sharing Scheme [PDF]

open access: yesMathematics Interdisciplinary Research, 2020
‎‎Secret sharing is an important issue in cryptography which has many applications‎. ‎In a secret sharing scheme‎, ‎a secret is shared by a dealer among several participants in such a way that any authorized subset of participants can recover the secret ...
Khadijeh Eslami, Mojtaba Bahramian
doaj   +2 more sources

PQSF: post-quantum secure privacy-preserving federated learning [PDF]

open access: yesScientific Reports
In federated learning, secret sharing is a key technology to maintain the privacy of participants’ local models. Moreover, with the rapid development of quantum computers, existing federated learning privacy protection schemes based on secret sharing ...
Xia Zhang   +4 more
doaj   +2 more sources

A Finite Equivalence of Verifiable Multi-secret Sharing [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2012
We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic ...
Hui Zhao   +5 more
doaj   +3 more sources

Authenticable quantum secret sharing based on special entangled state [PDF]

open access: yesScientific Reports
In this paper, a pair of quantum states are constructed based on an orthogonal array and further generalized to multi-body quantum systems. Subsequently, a novel physical process is designed, which is aimed at effectively masking quantum states within ...
Chen-Ming Bai, Ya-Xi Shu, Sujuan Zhang
doaj   +2 more sources

Publicly Verifiable Multi-stage Secret Sharing on General Access Structures [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
A publicly verifiable secret sharing allows anyone to detect the cheating of dealer or participants only from the public information. In order to expand the application scope of multi-secret sharing, firstly, a publicly verifiable multi-stage secret ...
SONG Yun, WANG Ningning, XIAO Menglin, SHAO Zhiyi
doaj   +1 more source

Visual secret sharing and related Works -A Review [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj   +1 more source

XOR-Based Progressively Secret Image Sharing

open access: yesMathematics, 2021
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily.
Cheng-Shian Lin   +2 more
doaj   +1 more source

ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve ...
Ruonan Shi   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy