Results 21 to 30 of about 375,511 (221)

A Linear Algebraic Threshold Essential Secret Image Sharing Scheme

open access: yesMathematics, 2022
A secret sharing scheme allocates to each participant a share of a secret in such a way that authorized subsets of participants can reconstruct the secret, while shares of unauthorized subsets of participants provide no useful information about the ...
Mohammad Ghebleh   +2 more
doaj   +1 more source

An Implementation of Image Secret Sharing Scheme Based on Matrix Operations

open access: yesMathematics, 2022
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj   +1 more source

ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve ...
Ruonan Shi   +4 more
doaj   +1 more source

XOR-Based Progressively Secret Image Sharing

open access: yesMathematics, 2021
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily.
Cheng-Shian Lin   +2 more
doaj   +1 more source

A Study on Multisecret-Sharing Schemes Based on Linear Codes

open access: yesEmerging Science Journal, 2020
Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some participants and a dealer. The dealer chooses a secret. The main principle is to distribute a secret amongst a group of participants.
Selda Çalkavur
doaj   +1 more source

Message Randomization and Strong Security in Quantum Stabilizer-Based Secret Sharing for Classical Secrets [PDF]

open access: yes, 2020
We improve the flexibility in designing access structures of quantum stabilizer-based secret sharing schemes for classical secrets, by introducing message randomization in their encoding procedures.
Matsumoto, Ryutaroh
core   +2 more sources

Applying cheating identifiable secret sharing scheme in multimedia security

open access: yesEURASIP Journal on Image and Video Processing, 2020
In (k,n) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provides an efficient way to protect ...
Zheng Ma   +4 more
doaj   +1 more source

On the size of shares for secret sharing schemes [PDF]

open access: yesJournal of Cryptology, 1992
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
R. M. Capocelli   +3 more
openaire   +5 more sources

Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares

open access: yesMathematics, 2020
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex ...
Hongliang Cai, Dan Tang
doaj   +1 more source

Polarization‐Assisted Visual Secret Sharing Encryption in Metasurface Hologram

open access: yesAdvanced Photonics Research, 2021
Secret sharing is an advanced encryption method that distributes the secret information into multiple participants and only the predesigned subsets of authorized participants can recover the secret by gathering their independent subinformation.
Zhenfei Li   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy