Results 41 to 50 of about 112,587 (333)

Secret-Sharing for NP [PDF]

open access: yes, 2014
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset ...
A. Beimel   +20 more
core   +4 more sources

An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages

open access: yesIEEE Access, 2019
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj   +1 more source

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme

open access: yesIEEE Access, 2020
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang   +3 more
doaj   +1 more source

Visual secret sharing and related Works -A Review [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj   +1 more source

Quantum Strongly Secure Ramp Secret Sharing [PDF]

open access: yes, 2014
Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed.
Matsumoto, Ryutaroh, Zhang, Paul
core   +2 more sources

Security of a kind of quantum secret sharing with entangled states

open access: yesScientific Reports, 2017
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others’ cooperation.
Tian-Yin Wang   +4 more
doaj   +1 more source

An Implementation of Image Secret Sharing Scheme Based on Matrix Operations

open access: yesMathematics, 2022
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj   +1 more source

Non-Threshold Quantum Secret Sharing Schemes in the Graph State Formalism

open access: yes, 2012
In a recent work, Markham and Sanders have proposed a framework to study quantum secret sharing (QSS) schemes using graph states. This framework unified three classes of QSS protocols, namely, sharing classical secrets over private and public channels ...
K. Rietjens   +2 more
core   +1 more source

On asymptotically good ramp secret sharing schemes [PDF]

open access: yes, 2015
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by Cramer et al. in terms of sequences of pairs of nested algebraic geometric codes. In those works the focus is on full privacy and full reconstruction. In
Geil, Olav   +4 more
core   +3 more sources

Verifiable multi-secret sharing schemes applicable to arbitrary access structures

open access: yesTongxin xuebao, 2007
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj   +2 more sources

Home - About - Disclaimer - Privacy