Results 11 to 20 of about 11,934 (254)
XOR-Based Progressively Secret Image Sharing
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily.
Cheng-Shian Lin +2 more
doaj +1 more source
Applying cheating identifiable secret sharing scheme in multimedia security
In (k,n) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provides an efficient way to protect ...
Zheng Ma +4 more
doaj +1 more source
Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex ...
Hongliang Cai, Dan Tang
doaj +1 more source
On Cheating Immune Secret Sharing [PDF]
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj +2 more sources
Infinite secret sharing – Examples [PDF]
Abstract. The motivation for extending secret sharing schemes to cases when either the set of players is infinite or the domain from which the secret and/or the shares are drawn is infinite or both, is similar to the case when switching to abstract probability spaces from classical combinatorial probability.
Dibert Alexander, Csirmaz László
openaire +6 more sources
Polarization‐Assisted Visual Secret Sharing Encryption in Metasurface Hologram
Secret sharing is an advanced encryption method that distributes the secret information into multiple participants and only the predesigned subsets of authorized participants can recover the secret by gathering their independent subinformation.
Zhenfei Li +7 more
doaj +1 more source
Genuine secret-sharing states [PDF]
Quantum secret sharing allows each player to have classical information for secret sharing in quantum mechanical ways. In this work, we construct a class of quantum states on which players can quantumly perform secret sharing secure against dishonest players as well as eavesdropper. We here call them the genuine secret-sharing states.
Minjin Choi, Soojoon Lee
openaire +2 more sources
An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj +1 more source
On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS) schemes decode the secret without computation, but each share is m times as big as the original ...
Daoshun Wang, Feng Yi
doaj +2 more sources
A (t, n) threshold protocol of semi-quantum secret sharing based on single particles
Semi-quantum secret sharing is an important research issue in quantum cryptography. In this paper, we propose a (t, n) threshold semi-quantum secret sharing protocol, which combines the practicality of semi-quantum secret sharing protocols and the ...
Ziyi Zhou +5 more
doaj +1 more source

