Results 21 to 30 of about 112,314 (333)

On Proactive Secret Sharing Schemes [PDF]

open access: yes, 2004
This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restriction to the adversary. We first investigate the approach of using commitment to 0 in the renewal phase in order to renew the player’s shares.
Nikov, V.S., Nikova, S.I.
openaire   +1 more source

An ECDLP-Based Verifiable Multi-Secret Sharing Scheme [PDF]

open access: yesMathematics Interdisciplinary Research, 2020
‎‎Secret sharing is an important issue in cryptography which has many applications‎. ‎In a secret sharing scheme‎, ‎a secret is shared by a dealer among several participants in such a way that any authorized subset of participants can recover the secret ...
Khadijeh Eslami, Mojtaba Bahramian
doaj   +1 more source

An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [PDF]

open access: yesComputer and Knowledge Engineering, 2023
Secret sharing schemes are ideally suited to save highly sensitive information in distributed systems. On the other hand, Zigzag-Decodable (ZD) codes are employed in wireless distributed platforms for encoding data using only bit-wise shift and XOR ...
saeideh Kabirirad   +2 more
doaj   +1 more source

Optimal non-perfect uniform secret sharing schemes [PDF]

open access: yes, 2014
A secret sharing scheme is non-perfect if some subsets of participants that cannot recover the secret value have partial information about it. The information ratio of a secret sharing scheme is the ratio between the maximum length of the shares and the ...
A. Beimel   +19 more
core   +1 more source

How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update

open access: yesIEEE Access, 2020
Threshold homomorphic encryption (Threshold HE) schemes are modified homomorphic encryption schemes to be suitable for privacy-preserving data integration and analysis.
Eunkyung Kim   +5 more
doaj   +1 more source

Communication Efficient Secret Sharing [PDF]

open access: yes, 2015
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a threshold secret sharing scheme, a secret is encoded into $n$ shares, such that any set of at least $t_1$ shares suffice to decode the secret, and any set ...
Bruck, Jehoshua   +3 more
core   +4 more sources

Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme

open access: yesIEEE Access, 2021
Secret Sharing has been recently used as an alternative approach to solve privacy-preserving issues in cloud-based data outsourcing, for overcoming the challenges faced when encryption-based methods are adopted.
Zhaohui Tang
doaj   +1 more source

On identification secret sharing schemes

open access: yesInformation and Computation, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cai, N., Lam, K.Y.
openaire   +1 more source

Linear Codes from Two Weakly Regular Plateaued Balanced Functions

open access: yesEntropy, 2023
Linear codes with a few weights have been extensively studied due to their wide applications in secret sharing schemes, strongly regular graphs, association schemes, and authentication codes.
Shudi Yang, Tonghui Zhang, Ping Li
doaj   +1 more source

An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages

open access: yesIEEE Access, 2019
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy