Results 1 to 10 of about 211,108 (260)
Essential Multi-Secret Image Sharing for Sensor Images [PDF]
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj +2 more sources
Implementing Quantum Secret Sharing on Current Hardware [PDF]
Quantum secret sharing is a cryptographic scheme that enables the secure storage and reconstruction of quantum information. While the theory of secret sharing is mature in its development, relatively few studies have explored the performance of quantum ...
Jay Graves, Mike Nelson, Eric Chitambar
doaj +2 more sources
An ECDLP-Based Verifiable Multi-Secret Sharing Scheme [PDF]
Secret sharing is an important issue in cryptography which has many applications. In a secret sharing scheme, a secret is shared by a dealer among several participants in such a way that any authorized subset of participants can recover the secret ...
Khadijeh Eslami, Mojtaba Bahramian
doaj +2 more sources
PQSF: post-quantum secure privacy-preserving federated learning [PDF]
In federated learning, secret sharing is a key technology to maintain the privacy of participants’ local models. Moreover, with the rapid development of quantum computers, existing federated learning privacy protection schemes based on secret sharing ...
Xia Zhang +4 more
doaj +2 more sources
A Finite Equivalence of Verifiable Multi-secret Sharing [PDF]
We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic ...
Hui Zhao +5 more
doaj +3 more sources
Authenticable quantum secret sharing based on special entangled state [PDF]
In this paper, a pair of quantum states are constructed based on an orthogonal array and further generalized to multi-body quantum systems. Subsequently, a novel physical process is designed, which is aimed at effectively masking quantum states within ...
Chen-Ming Bai, Ya-Xi Shu, Sujuan Zhang
doaj +2 more sources
Publicly Verifiable Multi-stage Secret Sharing on General Access Structures [PDF]
A publicly verifiable secret sharing allows anyone to detect the cheating of dealer or participants only from the public information. In order to expand the application scope of multi-secret sharing, firstly, a publicly verifiable multi-stage secret ...
SONG Yun, WANG Ningning, XIAO Menglin, SHAO Zhiyi
doaj +1 more source
Visual secret sharing and related Works -A Review [PDF]
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj +1 more source
XOR-Based Progressively Secret Image Sharing
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily.
Cheng-Shian Lin +2 more
doaj +1 more source
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve ...
Ruonan Shi +4 more
doaj +1 more source

