Results 1 to 10 of about 162,835 (326)

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme [PDF]

open access: yesEURASIP Journal on Advances in Signal Processing, 2010
Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS) schemes decode the secret without computation, but each share is m times as big as the original ...
Daoshun Wang, Feng Yi
doaj   +3 more sources

Robust Secret Image Sharing Scheme Against Noise in Shadow Images [PDF]

open access: goldIEEE Access, 2021
The (k, n)-threshold secret image sharing scheme is an image protection method, whose security comes partly from precise mathematical calculations, and even a little change in shadow images will lead to a false recovered image.
Yuyuan Sun   +4 more
doaj   +2 more sources

Nonlinear Secret Image Sharing Scheme [PDF]

open access: yesThe Scientific World Journal, 2014
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj   +3 more sources

Ideal hierarchical secret sharing schemes [PDF]

open access: yesIEEE Transactions on Information Theory, 2010
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays.
A. Beimel   +30 more
core   +8 more sources

Generalized Semi-Quantum Secret Sharing Schemes [PDF]

open access: yesPhysical Review A, 2012
We investigate quantum secret sharing schemes constructed from $[[n,k,\delta]]_D$ non-binary stabilizer quantum error correcting codes with carrier qudits of prime dimension $D$.
Gheorghiu, Vlad
core   +2 more sources

Efficient Multi-Party Quantum Secret Sharing Schemes [PDF]

open access: yesPhysical Review A, 2004
In this work, we generalize the quantum secret sharing scheme of Hillary, Bu\v{z}ek and Berthiaume[Phys. Rev. A59, 1829(1999)] into arbitrary multi-parties. Explicit expressions for the shared secret bit is given.
B. Schneier   +8 more
core   +2 more sources

Matroids and Quantum Secret Sharing Schemes [PDF]

open access: yesPhysical Review A, 2009
A secret sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret.
G. R. Blakley   +9 more
core   +2 more sources

Implementing Quantum Secret Sharing on Current Hardware [PDF]

open access: yesEntropy
Quantum secret sharing is a cryptographic scheme that enables the secure storage and reconstruction of quantum information. While the theory of secret sharing is mature in its development, relatively few studies have explored the performance of quantum ...
Jay Graves, Mike Nelson, Eric Chitambar
doaj   +2 more sources

Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images [PDF]

open access: hybrid, 2013
[[abstract]]A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified ...
Chien-Chang Chen, C.H. Liu
openalex   +3 more sources

NEW SCHEME OF MIGNOTTE (t,n) COLLABORATIVE SECRET SHARING ON CLOUD STORAGE

open access: diamondBarekeng
Cloud storage is an internet-based data storage service that allows users to collaborate to store, manage, and access data remotely. However, this collaborative characteristic creates challenges in security and privacy.
Dhea Ekaputri   +2 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy