Results 11 to 20 of about 11,934 (254)

XOR-Based Progressively Secret Image Sharing

open access: yesMathematics, 2021
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily.
Cheng-Shian Lin   +2 more
doaj   +1 more source

Applying cheating identifiable secret sharing scheme in multimedia security

open access: yesEURASIP Journal on Image and Video Processing, 2020
In (k,n) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provides an efficient way to protect ...
Zheng Ma   +4 more
doaj   +1 more source

Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares

open access: yesMathematics, 2020
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex ...
Hongliang Cai, Dan Tang
doaj   +1 more source

On Cheating Immune Secret Sharing [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +2 more sources

Infinite secret sharing – Examples [PDF]

open access: yesJournal of Mathematical Cryptology, 2014
Abstract. The motivation for extending secret sharing schemes to cases when either the set of players is infinite or the domain from which the secret and/or the shares are drawn is infinite or both, is similar to the case when switching to abstract probability spaces from classical combinatorial probability.
Dibert Alexander, Csirmaz László
openaire   +6 more sources

Polarization‐Assisted Visual Secret Sharing Encryption in Metasurface Hologram

open access: yesAdvanced Photonics Research, 2021
Secret sharing is an advanced encryption method that distributes the secret information into multiple participants and only the predesigned subsets of authorized participants can recover the secret by gathering their independent subinformation.
Zhenfei Li   +7 more
doaj   +1 more source

Genuine secret-sharing states [PDF]

open access: yesQuantum Information Processing, 2021
Quantum secret sharing allows each player to have classical information for secret sharing in quantum mechanical ways. In this work, we construct a class of quantum states on which players can quantumly perform secret sharing secure against dishonest players as well as eavesdropper. We here call them the genuine secret-sharing states.
Minjin Choi, Soojoon Lee
openaire   +2 more sources

An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages

open access: yesIEEE Access, 2019
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj   +1 more source

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

open access: yesEURASIP Journal on Advances in Signal Processing, 2010
Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS) schemes decode the secret without computation, but each share is m times as big as the original ...
Daoshun Wang, Feng Yi
doaj   +2 more sources

A (t, n) threshold protocol of semi-quantum secret sharing based on single particles

open access: yesFrontiers in Physics, 2023
Semi-quantum secret sharing is an important research issue in quantum cryptography. In this paper, we propose a (t, n) threshold semi-quantum secret sharing protocol, which combines the practicality of semi-quantum secret sharing protocols and the ...
Ziyi Zhou   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy