Results 241 to 250 of about 211,108 (260)
Some of the next articles are maybe not open access.

Multi secret sharing scheme using iterative method

Journal of Information and Optimization Sciences, 2018
AbstractMulti secret sharing is used to hide more than one secret information. In this approach secret information is divided in many parts and distributed among participants. Secret information may be in form of images also. Initially, Visual Cryptography (VC) applied for single secret images.
Abhishek Mishra, Ashutosh Gupta
openaire   +1 more source

Novel and Effective Multi-Secret Sharing Scheme

2013
A new multi-secret sharing (t, n) threshold scheme is proposed in this paper. The scheme uses the Lagrange interpolating polynomial to split and reconstruct the secrets based on Shamir secret sharing scheme, and verifies the legality of data by NTRU algorithm and one-way hashing function.
Shanyue Bu, Ronggeng Yang
openaire   +1 more source

A new (t,n) multi-secret sharing scheme based on Shamir’s secret sharing

Applied Mathematics and Computation, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Pang, Liao-Jun, Wang, Yu-Min
openaire   +2 more sources

Multi secret Sharing Based on Hill Cipher and Blakley Secret Sharing

2017 27th International Conference on Computer Theory and Applications (ICCTA), 2017
This paper presents multi secret sharing scheme using Hill cipher and Blakley secret sharing. The proposed scheme can reconstruct k- secret images with only or more of shadow images. The proposed scheme is compared with other related visual secret sharing schemes for gray scale images with a $(n, n)-$ threshold.
AA Mervat   +2 more
openaire   +1 more source

A New (t, n) Multi-Secret Sharing Scheme

2008 International Conference on Computer and Electrical Engineering, 2008
Secret sharing plays an important role in protecting important information from getting lost, destroyed, or into wrong hands. In 2000, Chien et al. proposed a (t, n) multi-secret sharing scheme. In 2004, Yang et al. proposed an alternative scheme based on Shamirpsilas secret sharing. In the next year, Pang et al. took another approach to share multiple
Xiao-qing Tan, Zhi-guo Wang
openaire   +1 more source

Enhanced Boolean-based multi secret image sharing scheme

Journal of Systems and Software, 2016
Recently, Chen and Wu propose a (n, n) multi secret image sharing (MSIS) scheme that shares n secret images into n shared images. These n shared images can be together used for reconstructing n secret images by Boolean operations. However, there is an inaccuracy in Chen and Wu's (n, n)-MSIS scheme that one can recover some secret images (partial secret
Ching-Nung Yang   +2 more
openaire   +1 more source

A Modified Multi-Secret Sharing Visual Cryptography Scheme

2008 International Conference on Computational Intelligence and Security, 2008
A modified threshold visual cryptography scheme (k, l, n)-VCS is proposed, which is used to analyze the relationship between the pixel expansion and the range of the participants? number. Based on (k, l, n)-VCS, a more precise definition of multi-secret sharing visual cryptography scheme is given, and a new method is presented.
Bin Yu, Zhengxin Fu, Liguo Fang
openaire   +1 more source

Enhanced Modulo Based Multi Secret Image Sharing Scheme

2016
Multi Secret Image Sharing (MSIS) scheme is a protected method to transmit more than one secret image over a communication channel. Traditionally, a single secret image is shared over a channel at a time. But as technology deepen, there arises a need for sharing more than one secret image. An (n, n)-MSIS scheme is used to encrypt n secret images into n
Maroti Deshmukh   +2 more
openaire   +1 more source

Extended Visual Cryptography Scheme for Multi-secret Sharing

2015
This paper proposes a novel user-friendly visual cryptography scheme for multiple secret sharing. We have generated meaningful shares for multiple secret images using cover images. These meaningful shares are shared among participants. All the shares are required to recover secret images that are shared.
L. Siva Reddy, Munaga V. N. K. Prasad
openaire   +1 more source

Authenticable dynamic hierarchical quantum multi-secret sharing scheme

Physica Scripta
Abstract Quantum secret sharing plays an essential role in quantum cryptography. This paper proposes a dynamic hierarchical quantum multi-secret sharing scheme based on linear homogeneous recurrence (LHR) relations. In the scheme, the distributor aggregates multiple secrets into a single master secret using the Chinese Remainder ...
Yuehua Li   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy