Optical secret sharing with cascaded metasurface holography [PDF]
The secret of a holographic image can be shared across two closely stacked metasurface holograms. Secret sharing is a well-established cryptographic primitive for storing highly sensitive information like encryption keys for encoded data.
Philip Georgi, Qunshuo Wei, Basudeb Sain
exaly +4 more sources
Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding [PDF]
Reversible data hiding in encrypted images (RDHEI) is an essential data security technique. Most RDHEI methods cannot perform well in embedding capacity and security.
Chunqiang Yu +3 more
openalex +2 more sources
High performance image steganography integrating IWT and Hamming code within secret sharing
Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct ...
Zahra Saeidi +4 more
semanticscholar +2 more sources
Polarization‐Assisted Visual Secret Sharing Encryption in Metasurface Hologram
multiple and the pre-designed subsets of authorized participants can recover the secret by gathering their independent sub-information. In this paper, we further expand the security level of secret sharing using electromagnetic manners and present a ...
Zhenfei Li +7 more
semanticscholar +2 more sources
Multi-Party Quantum Secret Sharing Based on GHZ State. [PDF]
Li Z, Jiang X, Liu L.
europepmc +3 more sources
Progressive Secret Sharing with Adaptive Priority and Perfect Reconstruction. [PDF]
Prasetyo H +2 more
europepmc +3 more sources
Efficient multiparty quantum-secret-sharing schemes
In this work, we generalize the quantum secret sharing scheme of Hillary, Bu\v{z}ek and Berthiaume[Phys. Rev. A59, 1829(1999)] into arbitrary multi-parties. Explicit expressions for the shared secret bit is given.
Gui Lu Long, Fu-Guo Deng, Jian-Wei Pan
exaly +3 more sources
Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem [PDF]
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain ...
Oğuzhan Ersoy +2 more
openalex +5 more sources
Continuous-Variable Quantum Secret Sharing Based on Thermal Terahertz Sources in Inter-Satellite Wireless Links. [PDF]
Liu C +5 more
europepmc +3 more sources
SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier. [PDF]
Krishna DP +6 more
europepmc +3 more sources

