Results 21 to 30 of about 112,314 (333)
On Proactive Secret Sharing Schemes [PDF]
This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restriction to the adversary. We first investigate the approach of using commitment to 0 in the renewal phase in order to renew the player’s shares.
Nikov, V.S., Nikova, S.I.
openaire +1 more source
An ECDLP-Based Verifiable Multi-Secret Sharing Scheme [PDF]
Secret sharing is an important issue in cryptography which has many applications. In a secret sharing scheme, a secret is shared by a dealer among several participants in such a way that any authorized subset of participants can recover the secret ...
Khadijeh Eslami, Mojtaba Bahramian
doaj +1 more source
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [PDF]
Secret sharing schemes are ideally suited to save highly sensitive information in distributed systems. On the other hand, Zigzag-Decodable (ZD) codes are employed in wireless distributed platforms for encoding data using only bit-wise shift and XOR ...
saeideh Kabirirad +2 more
doaj +1 more source
Optimal non-perfect uniform secret sharing schemes [PDF]
A secret sharing scheme is non-perfect if some subsets of participants that cannot recover the secret value have partial information about it. The information ratio of a secret sharing scheme is the ratio between the maximum length of the shares and the ...
A. Beimel +19 more
core +1 more source
How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update
Threshold homomorphic encryption (Threshold HE) schemes are modified homomorphic encryption schemes to be suitable for privacy-preserving data integration and analysis.
Eunkyung Kim +5 more
doaj +1 more source
Communication Efficient Secret Sharing [PDF]
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a threshold secret sharing scheme, a secret is encoded into $n$ shares, such that any set of at least $t_1$ shares suffice to decode the secret, and any set ...
Bruck, Jehoshua +3 more
core +4 more sources
Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
Secret Sharing has been recently used as an alternative approach to solve privacy-preserving issues in cloud-based data outsourcing, for overcoming the challenges faced when encryption-based methods are adopted.
Zhaohui Tang
doaj +1 more source
On identification secret sharing schemes
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cai, N., Lam, K.Y.
openaire +1 more source
Linear Codes from Two Weakly Regular Plateaued Balanced Functions
Linear codes with a few weights have been extensively studied due to their wide applications in secret sharing schemes, strongly regular graphs, association schemes, and authentication codes.
Shudi Yang, Tonghui Zhang, Ping Li
doaj +1 more source
An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj +1 more source

