Results 71 to 80 of about 375,511 (221)

Almost-perfect secret sharing [PDF]

open access: yes2011 IEEE International Symposium on Information Theory Proceedings, 2011
Splitting a secret s between several participants, we generate (for each value of s) shares for all participants. The goal: authorized groups of participants should be able to reconstruct the secret but forbidden ones get no information about it. In this paper we introduce several notions of non- perfect secret sharing, where some small information ...
openaire   +4 more sources

A global progressive image secret sharing scheme under multi-group joint management

open access: yesMathematical Biosciences and Engineering
Diverging from traditional secret sharing schemes, group secret sharing schemes enable the recovery of secret information through collaborative efforts among groups.
Lina Zhang   +3 more
doaj   +1 more source

Secret Sharing LDPC Codes for the BPSK-constrained Gaussian Wiretap Channel

open access: yes, 2011
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presence of a wiretapper who observes the transmission through another Gaussian ...
Shea, John M.   +2 more
core   +1 more source

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme

open access: yesIEEE Access, 2020
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang   +3 more
doaj   +1 more source

Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem [PDF]

open access: yes, 2016
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain ...
Ersoy, Oguzhan   +4 more
core   +1 more source

Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images

open access: yesIEEE Access, 2019
In today's era of developed network, it is particularly important to ensure the security of information. Secret image sharing is a kind of secret information protection technology with loss tolerance by sharing a secret image to a number of shadow images.
Qinghong Gong   +3 more
doaj   +1 more source

Controlled Quantum Secret Sharing

open access: yes, 2006
We present a new protocol in which a secret multiqubit quantum state $\ket{\Psi}$ is shared by $n$ players and $m$ controllers, where $\ket{\Psi}$ is the encoding state of a quantum secret sharing scheme.
Bennett C H Brassard G   +10 more
core   +1 more source

A novel meaningful secret image sharing method based on Arabic letters

open access: yesKuwait Journal of Science, 2016
In recent years, the providing of information security for multimedia has become an important subject of study. Visual cryptography and secret sharing is protected image contents without using complex mathematically operators.
Derya Avci
doaj  

Key distribution and recovery algorithm based on Shamir's secret sharing

open access: yesTongxin xuebao, 2015
In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about ...
Hui-gui RONG   +4 more
doaj   +2 more sources

Nonlinear Secret Image Sharing Scheme

open access: yesThe Scientific World Journal, 2014
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj   +1 more source

Home - About - Disclaimer - Privacy