Results 21 to 30 of about 3,018,405 (324)
An Implementation of Image Secret Sharing Scheme Based on Matrix Operations
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj +1 more source
A Survey on Perfectly Secure Verifiable Secret-sharing [PDF]
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It is used as a building block in several distributed computing tasks, such as Byzantine agreement and secure multi-party computation.
Anirudh Chandramouli +2 more
semanticscholar +1 more source
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve ...
Ruonan Shi +4 more
doaj +1 more source
XOR-Based Progressively Secret Image Sharing
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily.
Cheng-Shian Lin +2 more
doaj +1 more source
Applying cheating identifiable secret sharing scheme in multimedia security
In (k,n) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provides an efficient way to protect ...
Zheng Ma +4 more
doaj +1 more source
Message Randomization and Strong Security in Quantum Stabilizer-Based Secret Sharing for Classical Secrets [PDF]
We improve the flexibility in designing access structures of quantum stabilizer-based secret sharing schemes for classical secrets, by introducing message randomization in their encoding procedures.
Matsumoto, Ryutaroh
core +2 more sources
Detector-device-independent quantum secret sharing with source flaws. [PDF]
Yang X +6 more
europepmc +3 more sources
Multiparty mediated quantum secret sharing protocol [PDF]
This study proposes a multiparty mediated quantum secret sharing (MQSS) protocol that allows n restricted quantum users to share a secret via the assistance of a dishonest third-party with full quantum capabilities.
Chia‐Wei Tsai +2 more
semanticscholar +1 more source
Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex ...
Hongliang Cai, Dan Tang
doaj +1 more source
Theory of Communication Efficient Quantum Secret Sharing [PDF]
A $((k,n))$ quantum threshold secret sharing (QTS) scheme is a quantum cryptographic protocol for sharing a quantum secret among $n$ parties such that the secret can be recovered by any $k$ or more parties while $k-1$ or fewer parties have no ...
Kaushik Senthoor, P. Sarvepalli
semanticscholar +1 more source

