Results 31 to 40 of about 3,018,405 (324)

On Cheating Immune Secret Sharing [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +2 more sources

Secret-Sharing for NP [PDF]

open access: yes, 2014
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset ...
A. Beimel   +20 more
core   +4 more sources

A Common Method of Share Authentication in Image Secret Sharing

open access: yesIEEE transactions on circuits and systems for video technology (Print), 2021
Because of the importance of digital images and their extensive application to digital watermarking, block chain, access control, identity authentication, distributive storage in the cloud and so on, image secret sharing (ISS) is attracting ever ...
Xuehu Yan   +4 more
semanticscholar   +1 more source

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

open access: yesEURASIP Journal on Advances in Signal Processing, 2010
Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS) schemes decode the secret without computation, but each share is m times as big as the original ...
Daoshun Wang, Feng Yi
doaj   +2 more sources

An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages

open access: yesIEEE Access, 2019
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj   +1 more source

Experimental demonstration of four-party quantum secret sharing [PDF]

open access: yes, 2006
Secret sharing is a multiparty cryptographic task in which some secret information is splitted into several pieces which are distributed among the participants such that only an authorized set of participants can reconstruct the original secret.
C. Kurtsiefer   +7 more
core   +2 more sources

A (t, n) threshold protocol of semi-quantum secret sharing based on single particles

open access: yesFrontiers in Physics, 2023
Semi-quantum secret sharing is an important research issue in quantum cryptography. In this paper, we propose a (t, n) threshold semi-quantum secret sharing protocol, which combines the practicality of semi-quantum secret sharing protocols and the ...
Ziyi Zhou   +5 more
doaj   +1 more source

Secure secret sharing in the cloud [PDF]

open access: yes, 2017
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core   +1 more source

Communication Efficient Secret Sharing [PDF]

open access: yes, 2015
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a threshold secret sharing scheme, a secret is encoded into $n$ shares, such that any set of at least $t_1$ shares suffice to decode the secret, and any set ...
Bruck, Jehoshua   +3 more
core   +4 more sources

Lattice-based Threshold Secret Sharing Algorithm [PDF]

open access: yesJisuanji gongcheng, 2016
The secret sharing algorithm based on the traditional mathematical assumption is difficult to resist the attack of the quantum algorithm.Therefore,a lattice-based threshold secret sharing algorithm is proposed.The basic process of the secret sharing ...
ZHANG Hongjun,LIU Ke,MOU Zhansheng
doaj   +1 more source

Home - About - Disclaimer - Privacy