Results 11 to 20 of about 162,835 (326)
An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj +3 more sources
Publicly Verifiable Multi-stage Secret Sharing on General Access Structures [PDF]
A publicly verifiable secret sharing allows anyone to detect the cheating of dealer or participants only from the public information. In order to expand the application scope of multi-secret sharing, firstly, a publicly verifiable multi-stage secret ...
SONG Yun, WANG Ningning, XIAO Menglin, SHAO Zhiyi
doaj +1 more source
Applying cheating identifiable secret sharing scheme in multimedia security
In (k,n) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provides an efficient way to protect ...
Zheng Ma +4 more
doaj +1 more source
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve ...
Ruonan Shi +4 more
doaj +1 more source
An Implementation of Image Secret Sharing Scheme Based on Matrix Operations
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj +1 more source
Message Randomization and Strong Security in Quantum Stabilizer-Based Secret Sharing for Classical Secrets [PDF]
We improve the flexibility in designing access structures of quantum stabilizer-based secret sharing schemes for classical secrets, by introducing message randomization in their encoding procedures.
Matsumoto, Ryutaroh
core +2 more sources
Universally ideal secret-sharing schemes [PDF]
Summary: Given a set of parties \(\{1, \dots, n\}\), an access structure is a monotone collection of subsets of the parties. For a certain domain of secrets, a secret-sharing scheme for an access structure is a method for a dealer to distribute shares to the parties.
Beimel, Amos, Chor, Benny
openaire +3 more sources
Ideal Multipartite Secret Sharing Schemes [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Farràs, Oriol +2 more
openaire +3 more sources
Fully dynamic secret sharing schemes [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blundo, Carlo +3 more
openaire +2 more sources
Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex ...
Hongliang Cai, Dan Tang
doaj +1 more source

