Results 91 to 100 of about 375,511 (221)

Bipartite secret sharing and staircases

open access: yesDiscrete Mathematics
Bipartite secret sharing schemes have a bipartite access structure in which the set of participants is divided into two parts and all participants in the same part play an equivalent role. Such a bipartite scheme can be described by a \emph{staircase}: the collection of its minimal points.
Csirmaz, Laszlo   +2 more
openaire   +3 more sources

Significant Secret Image Sharing Scheme Based on Boolean Operation

open access: yesCybernetics and Information Technologies, 2017
Traditionally, (k, n) secret image sharing is an approach of breaking down a secret image into n number of shadow images to assign them to n number of users, so that any k or more then k users can bring back the secret image.
Verma Monu, Rani Rajneesh
doaj   +1 more source

SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier. [PDF]

open access: yesSci Rep, 2023
Krishna DP   +6 more
europepmc   +1 more source

A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity. [PDF]

open access: yesEntropy (Basel), 2023
Tian Y   +5 more
europepmc   +1 more source

High performance image steganography integrating IWT and Hamming code within secret sharing

open access: yesIET Image Processing
Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct ...
Zahra Saeidi   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy