Results 1 to 10 of about 112,314 (333)

Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation. [PDF]

open access: yesPLoS ONE, 2016
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure.
Lifeng Yuan   +4 more
doaj   +2 more sources

Advance Sharing of Quantum Shares for Classical Secrets

open access: yesIEEE Access, 2022
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret sharing schemes. Classical secret sharing has been known to be able to distribute some shares before a given secret. On the other hand,
Rina Miyajima, Ryutaroh Matsumoto
doaj   +1 more source

IoT-Applicable Generalized Frameproof Combinatorial Designs

open access: yesIoT, 2023
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share ...
Bimal Kumar Roy, Anandarup Roy
doaj   +1 more source

Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares

open access: yesMathematics, 2020
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex ...
Hongliang Cai, Dan Tang
doaj   +1 more source

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

open access: yesIET Information Security, 2021
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea   +1 more
doaj   +1 more source

Applying cheating identifiable secret sharing scheme in multimedia security

open access: yesEURASIP Journal on Image and Video Processing, 2020
In (k,n) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provides an efficient way to protect ...
Zheng Ma   +4 more
doaj   +1 more source

Boolean-Based (k, n, m) Multi-Secret Image Sharing

open access: yesAxioms, 2022
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property.
Chien-Chang Chen   +2 more
doaj   +1 more source

Constructions of some secret sharing schemes based on linear codes [PDF]

open access: yesИзвестия Саратовского университета. Новая серия: Математика. Механика. Информатика
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing  scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any
Ratseev, Sergey Mihailovich
doaj   +1 more source

Comparing Security Notions of Secret Sharing Schemes

open access: yesEntropy, 2015
Different security notions of secret sharing schemes have been proposed by different information measures. Entropies, such as Shannon entropy and min entropy, are frequently used in the setting security notions for secret sharing schemes.
Songsong Dai, Donghui Guo
doaj   +1 more source

Meaningful Secret Image Sharing with Saliency Detection

open access: yesEntropy, 2022
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage.
Jingwen Cheng   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy