Results 1 to 10 of about 3,018,405 (324)

Optical secret sharing with cascaded metasurface holography [PDF]

open access: yesScience Advances, 2021
The secret of a holographic image can be shared across two closely stacked metasurface holograms. Secret sharing is a well-established cryptographic primitive for storing highly sensitive information like encryption keys for encoded data.
Philip Georgi, Qunshuo Wei, Basudeb Sain
exaly   +4 more sources

Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding [PDF]

open access: bronzeIEEE transactions on circuits and systems for video technology (Print), 2023
Reversible data hiding in encrypted images (RDHEI) is an essential data security technique. Most RDHEI methods cannot perform well in embedding capacity and security.
Chunqiang Yu   +3 more
openalex   +2 more sources

High performance image steganography integrating IWT and Hamming code within secret sharing

open access: yesIET Image Processing, 2023
Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct ...
Zahra Saeidi   +4 more
semanticscholar   +2 more sources

Polarization‐Assisted Visual Secret Sharing Encryption in Metasurface Hologram

open access: yesAdvanced Photonics Research, 2021
multiple and the pre-designed subsets of authorized participants can recover the secret by gathering their independent sub-information. In this paper, we further expand the security level of secret sharing using electromagnetic manners and present a ...
Zhenfei Li   +7 more
semanticscholar   +2 more sources

Efficient multiparty quantum-secret-sharing schemes

open access: yesPhysical Review A, 2004
In this work, we generalize the quantum secret sharing scheme of Hillary, Bu\v{z}ek and Berthiaume[Phys. Rev. A59, 1829(1999)] into arbitrary multi-parties. Explicit expressions for the shared secret bit is given.
Gui Lu Long, Fu-Guo Deng, Jian-Wei Pan
exaly   +3 more sources

Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem [PDF]

open access: green, 2016
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain ...
Oğuzhan Ersoy   +2 more
openalex   +5 more sources

SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier. [PDF]

open access: goldSci Rep, 2023
Krishna DP   +6 more
europepmc   +3 more sources

Home - About - Disclaimer - Privacy