Results 31 to 40 of about 162,835 (326)
On identification secret sharing schemes
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cai, N., Lam, K.Y.
openaire +1 more source
(t,n) multi-secret sharing scheme extended from Harn-Hsu’s scheme
Multi-secret sharing scheme has been well studied in recent years. In most multi-secret sharing schemes, all secrets must be recovered synchronously; the shares cannot be reused any more.
Tong Zhang, Xizheng Ke, Yanxiao Liu
doaj +1 more source
Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations
Wireless sensor network is a key technology in the sensing layer of the Internet of Things. Data security in wireless sensor network is directly related to the authenticity and validity of data transmitted in the Internet of Things.
Yan Lin +3 more
doaj +1 more source
Nearly optimal robust secret sharing [PDF]
: We prove that a known approach to improve Shamir's celebrated secret sharing scheme; i.e., adding an information-theoretic authentication tag to the secret, can make it robust for n parties against any collusion of size δn, for any constant δ ∈ (0; 1/2)
Cheraghchi Bashi Astaneh, M
core +1 more source
Polarization‐Assisted Visual Secret Sharing Encryption in Metasurface Hologram
Secret sharing is an advanced encryption method that distributes the secret information into multiple participants and only the predesigned subsets of authorized participants can recover the secret by gathering their independent subinformation.
Zhenfei Li +7 more
doaj +1 more source
Two-in-One Secret Image Sharing Scheme with Higher Visual Quality of the Previewed Image
Secret image sharing (SIS) scheme is a secret image encoding and decoding scheme that reconstructs the secret image only if the number of participants is sufficient. In contrast, inadequate participants gain no information about the secret image.
Xin Wang, Peng Li, Zihan Ren
doaj +1 more source
Optimal non-perfect uniform secret sharing schemes [PDF]
A secret sharing scheme is non-perfect if some subsets of participants that cannot recover the secret value have partial information about it. The information ratio of a secret sharing scheme is the ratio between the maximum length of the shares and the ...
A. Beimel +19 more
core +1 more source
Reusing Shares in Secret Sharing Schemes [PDF]
A (t, w) threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders is required in order to reconstruct the shared secret. This paper is concerned with the re-use of shares possessed by shareholders in threshold schemes.
Zheng, Yuliang +2 more
openaire +2 more sources
Inspired by natural silicified wood, a biomimetic mineralized chitin‐derived aerogel is constructed. It can withstand 81 000 times its own weight, and its backside temperature is 130.4°C after exposure to ∼1300°C butane flame for 600 s, exhibiting high‐strength, fire‐resistance, and super thermal‐insulation properties.
Kai Xu +11 more
wiley +1 more source
An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core

