To see the other types of publications on this topic, follow the link: MULTI SECRET SHARING SCHEME.

Journal articles on the topic 'MULTI SECRET SHARING SCHEME'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'MULTI SECRET SHARING SCHEME.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Endurthi, Anjaneyulu, Oinam B. Chanu, Appala N. Tentu, and V. Ch Venkaiah. "Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT." Journal of Communications Software and Systems 11, no. 1 (March 23, 2015): 15. http://dx.doi.org/10.24138/jcomss.v11i1.113.

Full text
Abstract:
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8]. The first scheme that uses the Mignotte’s sequence is a single secret scheme; the second one is an extension of the first one to Multi-secret sharing scheme. The third scheme is again for the case of multi-secrets but it is an improvement over the second scheme in the sense that it reduces the number of publicvalues. The first scheme that uses the Asmuth-Bloom sequence is designed for the case of a single secret and the second one is an extension of the first scheme to the case of multi-secrets. Novelty of the proposed schemes is that the shares of the participants are reusable i.e. same shares are applicable even with a new secret. Also only one share needs to be kept by each participant even for the muslti-secret sharing scheme. Further, the schemes are capable of verifying the honesty of the participants including the dealer. Correctness of the proposed schemes is discussed and show that the proposed schemes are computationally secure.
APA, Harvard, Vancouver, ISO, and other styles
2

ZHANG, EN, and YONGQUAN CAI. "RATIONAL MULTI-SECRET SHARING SCHEME IN STANDARD POINT-TO-POINT COMMUNICATION NETWORKS." International Journal of Foundations of Computer Science 24, no. 06 (September 2013): 879–97. http://dx.doi.org/10.1142/s012905411350024x.

Full text
Abstract:
Rational secret sharing was first introduced by Halpern and Teague (STOC, 2004). Since then, a series of works have focused on designing rational secret sharing protocols. However, most existing solutions can share only one secret at one secret sharing process. To share multiple secrets such as m secrets, the dealer must redistribute shares for m times. In addition, previous works assume existence of broadcast channel which is not realistic. Motivated by those problems, this paper proposes a rational multi-secret sharing scheme, which combines the secret sharing scheme with game theory. In the protocol, the problem of sharing multiple secrets is addressed, and there are multiple secrets to be shared during one secret sharing process. Furthermore, this work starts off by constructing a protocol in simultaneous broadcast networks, and then we emulate the broadcast channel over point-to-point networks. Based on a computational assumption, we show that rational players have no incentive to deviate from the protocol and every player can obtain multi-secret fairly.
APA, Harvard, Vancouver, ISO, and other styles
3

Cai, Hongliang, and Dan Tang. "Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares." Mathematics 8, no. 9 (September 14, 2020): 1582. http://dx.doi.org/10.3390/math8091582.

Full text
Abstract:
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex algebraic-based methods, which can realize the sharing of multi secret images. However, the existing Boolean-based multi secret sharing schemes are mostly restricted to the particular case of (2, n) and (n, n), only few Boolean-based multi secret sharing schemes study the general access structure, and the shares are mostly meaningless. In this paper, a new Boolean-based multi secret sharing scheme with the general access structure is proposed. All the shares are meaningful, which can avoid attracting the attention of adversaries, and the secret images can be recovered in a lossless manner. The feasibility of the scheme is proven, the performance is validated by the experiments on the gray images, and the analysis of the comparison with other methods is also given out.
APA, Harvard, Vancouver, ISO, and other styles
4

Juan, Justie Su-Tzu, Jen-Yu Lin, Bo-Yuan Huang, and Yu-Chun Chung. "Advanced fault-tolerant visual multi-secret sharing scheme." Journal of Surveillance, Security and Safety 3 (2022): 41–54. http://dx.doi.org/10.20517/jsss.2021.29.

Full text
Abstract:
Aim: In visual cryptography, a secret image is encrypted into two meaningless random images called shares. These two shares can be stacked to recover the secret image without any calculations. However, because of the alignment problem in the decryption phase, risk of poor quality of the restored image exists. Encrypting multiple secrets on two images simultaneously can improve execution efficiency. Methods: Let 7 × 7 pixels be a unit; this paper designs a codebook for any unit in the secret images by using a random grid. Besides, this paper shows a general shifting approach that can embed N (≥ 2) secret images simultaneously with adjustable distortion. Results: This paper provides a visual multi-secret sharing scheme without pixel expansion; the proposed scheme can encrypt more than two secret images into two shares simultaneously. During decoding, aligning the shares precisely is not necessary. Conclusion: Theoretical analysis and simulation results indicate the effectiveness and practicality of the proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
5

Luo, Shuangshuang, Zhihui Li, Depeng Meng, and Jiansheng Guo. "Efficient quantum secret sharing scheme based on monotone span program." Laser Physics 33, no. 8 (June 22, 2023): 085201. http://dx.doi.org/10.1088/1555-6611/acd630.

Full text
Abstract:
Abstract How to efficiently share secrets among multiple participants is a very important problem in key management. In this paper, we propose a multi-secret sharing scheme based on the Greenberger Horne Zeilinger (GHZ) state. First, the distributor uses monotone span program to encode the secrets and generate the corresponding secret shares to send to the participants. Then, each participant uses the generalized Pauli operator to embed its own secret share into the transmitted particle. The participant who wants to get the secrets can get multiple secrets at the same time by performing a GHZ-state joint measurement. Furthermore, since this scheme is based on a monotone span program, its access structure is more general than the access structure (t, n) threshold. Compared with other schemes, our proposed scheme is more efficient, less computational cost.
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Guoai, Jiangtao Yuan, Guosheng Xu, and Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier." Information Technology and Control 50, no. 2 (June 17, 2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.

Full text
Abstract:
Multi-stage secret sharing scheme is practical in the case that there is a security system with m ordered checkpoints.It is natural to divide the m checkpoints into m different levels. There are m different secrets, and eachof them with a different importance corresponds to a checkpoint/level. The participants are also divided intom disjoint levels as they do in the hierarchical threshold access structure. Hierarchical threshold access structurewith the existential quantifier ( HTAS∃ ) does not cover the common practice that at least a few numbersof high-ranking participants are required to be involved in any recovery of the secret. The popular schemeswith hierarchical access structure were needed to check many matrices for non-singularity. We propose amulti-stage secret sharing scheme for HTAS∃ , and the tools are based on the linear homogeneous recurrencerelations (LHRRs) and one-way functions. We give the HTAS∃ a modification, so that this hierarchical accessstructure can satisfy the common practice. In our scheme, if the participants are divided into m levels, thereusually has m secrets. But before the (j − 1)-th secret is recovered, the j-th secret cannot be recovered. Ourscheme is a computational secure. The proposed scheme requires a share for each participant and the shareis as long as each secret. Our scheme has high efficiency by comparing with the state-of-the-art hierarchicalsecret sharing schemes.
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Chien-Chang, Cheng-Shian Lin, and Jia-Zhan Chen. "Boolean-Based (k, n, m) Multi-Secret Image Sharing." Axioms 11, no. 5 (April 23, 2022): 197. http://dx.doi.org/10.3390/axioms11050197.

Full text
Abstract:
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property. Simultaneously, the adopted Boolean method preserves high performance. The proposed (k, n, m) multi-secret image sharing scheme shares m secret images among n participants and gathering k participants’ shared images perfectly recovers these m secret images. The proposed scheme exhibits high performance because of the usage of Boolean-based processing. Moreover, the usage of a sharing matrix based strategy acquires perfect reconstruction of the secret images under (k, n) thresholds. Two proposed schemes, the source-random-mixed (SRM) and the source-random-separate (SRS) methods, are presented in this study from different strategies of sharing the random image mixed with the secret images or separated to the secret images, respectively. Moreover, the proposed SRS method exhibits the better sharing capacity. Experimental results show that the proposed schemes perform well on sharing efficiency and security.
APA, Harvard, Vancouver, ISO, and other styles
8

Csirmaz, Laszlo. "Secret sharing and duality." Journal of Mathematical Cryptology 15, no. 1 (November 25, 2020): 157–73. http://dx.doi.org/10.1515/jmc-2019-0045.

Full text
Abstract:
AbstractSecret sharing is an important building block in cryptography. All explicit secret sharing schemes which are known to have optimal complexity are multi-linear, thus are closely related to linear codes. The dual of such a linear scheme, in the sense of duality of linear codes, gives another scheme for the dual access structure. These schemes have the same complexity, namely the largest share size relative to the secret size is the same. It is a long-standing open problem whether this fact is true in general: the complexity of any access structure is the same as the complexity of its dual. We give a partial answer to this question. An almost perfect scheme allows negligible errors, both in the recovery and in the independence. There exists an almost perfect ideal scheme on 174 participants whose complexity is strictly smaller than that of its dual.
APA, Harvard, Vancouver, ISO, and other styles
9

Chang, Joy, Bo-Yuan Huang, and Justie Juan. "A New Visual Multi-Secrets Sharing Scheme by Random Grids." Cryptography 2, no. 3 (September 17, 2018): 24. http://dx.doi.org/10.3390/cryptography2030024.

Full text
Abstract:
In (2, 2)-visual secret sharing (VSS) schemes, a common type of (k, n)-threshold VSS schemes, secret information can be decoded directly through only two shares by using a human vision system. Several studies have analyzed methods of simplifying the decoding process and refining encoding to pass more secret images through two identical shares. However, limited secret images are retrieved, and the quality of the recovered images is low. This paper proposes an advanced (2, 2)-VSS scheme that can embed N secret images into two rectangular shares. Compared with other related VSS schemes, more secret images can be encrypted and the distortion is adjustable in the proposed scheme, yielding more flexibility in theory and practice.
APA, Harvard, Vancouver, ISO, and other styles
10

Hwang, Ren-Junn, and Chin-Chen Chang. "An on-line secret sharing scheme for multi-secrets." Computer Communications 21, no. 13 (September 1998): 1170–76. http://dx.doi.org/10.1016/s0140-3664(98)00191-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Choudhary, Shipra PraveenKumar, Apeksha Katarni, Shweta Manjrekar, Mrs Vidyullata Devmane, and Mrs Vaishali Hirlekar. "Secret Sharing Approach in Multi-database System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 6 (April 20, 2016): 6819–23. http://dx.doi.org/10.24297/ijct.v15i6.1606.

Full text
Abstract:
Secret sharing schemes are ideal for storing highly sensitive data. A secret is divided into many parts and every participant gets his unique part. If we combine all of these parts and try regenerating the secret then it might be impractical, and therefore the threshold scheme is used. Shamir’s secret sharing scheme supports the same. Here, some of the parts or all of them are required to reconstruct the secret. Any threshold number of parts are sufficient to reconstruct the original secret. The Admin has a set of files which are confidentiality and availability of data. Whenever a Client requests to access the files, the Admin performs authentication of the user through an encrypted and stored on multiple databases so as to achieve Authentication module, who makes use if Shamir's secret sharing concept. This is similar to the One Time Password (OTP) mechanism. If the Client is authentic, Admin grants him the decryption key and the Client can access the file. In this paper, we shall discuss all this in detail using which we can provide security, replication of data and authentication.Â
APA, Harvard, Vancouver, ISO, and other styles
12

Qin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Secret Sharing Scheme on Access Structure." Applied Mechanics and Materials 571-572 (June 2014): 63–68. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.63.

Full text
Abstract:
A secret sharing scheme on access structure is proposed basing on the Lagrange interpolation, in which any extra information for each qualified subset is not needed, and each participant only needs to keep one shadow. Besides, the proposed scheme can be used to share multi-secret. Compared to the existing schemes, the proposed scheme is more simple, and easy to be applied in practice.
APA, Harvard, Vancouver, ISO, and other styles
13

Lin, Yan, Hongliang Zhu, Guoai Xu, and Guosheng Xu. "Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations." International Journal of Distributed Sensor Networks 18, no. 3 (March 2022): 155013292210887. http://dx.doi.org/10.1177/15501329221088740.

Full text
Abstract:
Wireless sensor network is a key technology in the sensing layer of the Internet of Things. Data security in wireless sensor network is directly related to the authenticity and validity of data transmitted in the Internet of Things. Due to the large number and different types of nodes in wireless sensor networks, layered secret key sharing technology is increasingly used in wireless sensor networks. In a hierarchical secret sharing scheme, participants are divided into sections with different permissions for each team, but the same permissions for participants in the same team. In this article, we follow the approach of the hierarchical secret sharing scheme derived from the linear homogeneous recurrence relations. We design a hierarchical multi-secret sharing scheme for wireless sensor networks on the basis of the elliptic curve public key cryptosystem combined with the linear homogeneous recurrence relations. In the proposed scheme, we do not make sure that the participants are half-truthful. In addition, the participants’ shadows can be reused. Our scheme is computational security. Only one share from each member is required in our hierarchical multi-secret sharing scheme. It is more suitable for wireless sensor networks compared to the up-to-date schemes.
APA, Harvard, Vancouver, ISO, and other styles
14

Eslamia, Khadijeh, and Mojtaba Bahramiana. "An isogeny-based quantum-resistant secret sharing scheme." Filomat 36, no. 10 (2022): 3249–58. http://dx.doi.org/10.2298/fil2210249e.

Full text
Abstract:
In a secret sharing scheme, a secret is distributed among several participants in such a way that only any authorized subset of participants is able to recover the secret. So far, the security of many secret sharing schemes has been based on the hardness of some mathematical problems, such as discrete logarithm and factorization. These problems can be solved in polynomial time using Shor?s algorithm for a quantum computer. In this paper, we propose an efficient multi-secret sharing scheme based on the hardness of computing isogenies between supersingular elliptic curves. The proposed scheme is based on De Feo and Jao key exchange protocol. We prove that our scheme is secure under computational assumptions in which there is no known efficient quantum algorithm.
APA, Harvard, Vancouver, ISO, and other styles
15

MAO, Ying-ying, Ming MAO, and Yan-shuo ZHANG. "Verifiable hierarchical threshold multi-secret sharing scheme." Journal of Computer Applications 29, no. 1 (June 25, 2009): 172–74. http://dx.doi.org/10.3724/sp.j.1087.2009.00172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

WANG, Wei, and Shun-xian ZHOU. "Multi-secret sharing scheme among weighted participants." Journal of Computer Applications 30, no. 12 (January 6, 2011): 3334–36. http://dx.doi.org/10.3724/sp.j.1087.2010.03334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Jian, Yanheng Liu, and Yanxi Wang. "On Novel Verifiable Multi-Secret Sharing Scheme." Advanced Science Letters 4, no. 11 (November 1, 2011): 3709–15. http://dx.doi.org/10.1166/asl.2011.1259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Yang, Chou-Chen, Ting-Yi Chang, and Min-Shiang Hwang. "A (t,n) multi-secret sharing scheme." Applied Mathematics and Computation 151, no. 2 (April 2004): 483–90. http://dx.doi.org/10.1016/s0096-3003(03)00355-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Mishra, Abhishek, and Ashutosh Gupta. "Multi secret sharing scheme using iterative method." Journal of Information and Optimization Sciences 39, no. 3 (April 3, 2018): 631–41. http://dx.doi.org/10.1080/02522667.2017.1385161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Zhao, Jianjie, Jianzhong Zhang, and Rong Zhao. "A practical verifiable multi-secret sharing scheme." Computer Standards & Interfaces 29, no. 1 (January 2007): 138–41. http://dx.doi.org/10.1016/j.csi.2006.02.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Chan, Chao-Wen, and Chin-Chen Chang. "A scheme for threshold multi-secret sharing." Applied Mathematics and Computation 166, no. 1 (July 2005): 1–14. http://dx.doi.org/10.1016/j.amc.2004.04.081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Pang, Liao-Jun, and Yu-Min Wang. "A new (t,n) multi-secret sharing scheme based on Shamir’s secret sharing." Applied Mathematics and Computation 167, no. 2 (August 2005): 840–48. http://dx.doi.org/10.1016/j.amc.2004.06.120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zhou, Jun, and Zhen Yu Yang. "Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme." Applied Mechanics and Materials 411-414 (September 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.141.

Full text
Abstract:
The Internet of things is widespread concerned by the whole society now. As an important component of the Internet of things, wireless sensor network has wide application prospect in various fields such as medical and health, military defense. The traditional data privacy protection technology of PKI system used in the WSN networks has its own weakness. This paper presents the secret key sharing mechanism to protect data privacy. The secret key, remote node and base station used to communicate, was divided into multiple secrets. The multiple secrets were distributed in the nodes which connect directly to the base station node. Only through collect more than threshold number of multi-secret that can decrypt the communication data between the base station and the remote node. To be safer, we used digital watermarking technology to protect the data transmission between the base station and the aggregate node. These techniques combined with the data slice, homomorphism encryption technology to protect data privacy, construct a safe and efficient wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
24

Mesnager, Sihem, Ahmet Sınak, and Oğuz Yayla. "Threshold-Based Post-Quantum Secure Verifiable Multi-Secret Sharing for Distributed Storage Blockchain." Mathematics 8, no. 12 (December 14, 2020): 2218. http://dx.doi.org/10.3390/math8122218.

Full text
Abstract:
Blockchain systems store transaction data in the form of a distributed ledger where each node stores a copy of all data, which gives rise to storage issues. It is well-known that the tremendous storage and distribution of the block data are common problems in blockchain systems. In the literature, some types of secret sharing schemes are employed to overcome these problems. The secret sharing method is one of the most significant cryptographic protocols used to ensure the privacy of the data. The main purpose of this paper is to improve the recent distributed storage blockchain systems by proposing an alternative secret sharing method. We first propose a secure threshold verifiable multi-secret sharing scheme that has the verification and private communication steps based on post-quantum lattice-based hard problems. We then apply the proposed threshold scheme to the distributed storage blockchain (DSB) system to share transaction data at each block. In the proposed DSB system, we encrypt the data block with the AES-256 encryption algorithm before distributing it among nodes at each block, and both its secret key and the hash value of the block are privately shared among nodes simultaneously by the proposed scheme. Thereafter, in the DSB system, the encrypted data block is encoded by the Reed–Solomon code, and it is shared among nodes. We finally analyze the storage and recovery communication costs and the robustness of the proposed DSB system. We observe that our approach improves effectively the recovery communication cost and makes it more robust compared to the previous DSB systems. It also improves extremely the storage cost of the traditional blockchain systems. Furthermore, the proposed scheme brings to the DSB system the desirable properties such as verification process and secret communication without private channels in addition to the known properties of the schemes used in the previous DSB systems. As a result of the flexibility on the threshold parameter of the scheme, a diverse range of qualified subsets of nodes in the DSB system can privately recover the secret values.
APA, Harvard, Vancouver, ISO, and other styles
25

Qin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Leakproof Secret Sharing Scheme Based on Environment Sensing." Applied Mechanics and Materials 665 (October 2014): 647–53. http://dx.doi.org/10.4028/www.scientific.net/amm.665.647.

Full text
Abstract:
A leakproof secret sharing scheme based on environment sensing is proposed, in which the shadows of participants and the shared secret are leakproof, and can be used repeatedly. The counterfeit shadows of the participants and the authentication information of the shared secret can be changed dynamically basing on environment sensing. So the scheme is secure even against a mobile adversary. Besides, through introducing the concept of adversary structure and the transformation of access structure to adversary structure, the secret sharing on general access structure is realized. Compared to the existing schemes, our scheme is more secure and more flexible in practice. Our scheme is particularly suitable for the system which needs to run long time in the open, such as the wireless sensor network and the multi-robots, the property of leakproof based on environment sensing can improve the efficiency and security of these systems effectively.
APA, Harvard, Vancouver, ISO, and other styles
26

Yu, Bin, Gang Shen, and Zheng-xin Fu. "A Lossless Multi-secret Sharing Visual Cryptography Scheme." Journal of Electronics & Information Technology 34, no. 12 (July 11, 2013): 2885–90. http://dx.doi.org/10.3724/sp.j.1146.2012.00300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Yang, Ching-Nung, Cheng-Hua Chen, and Song-Ruei Cai. "Enhanced Boolean-based multi secret image sharing scheme." Journal of Systems and Software 116 (June 2016): 22–34. http://dx.doi.org/10.1016/j.jss.2015.01.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Xiao, Heling, and Jingliang Gao. "Multi-party d-Level Quantum Secret Sharing Scheme." International Journal of Theoretical Physics 52, no. 6 (January 11, 2013): 2075–82. http://dx.doi.org/10.1007/s10773-012-1481-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Feng, You-sheng Zhou, and Dao-feng Li. "Dynamic threshold changeable multi-policy secret sharing scheme." Security and Communication Networks 8, no. 18 (June 4, 2015): 3653–58. http://dx.doi.org/10.1002/sec.1288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Li, Zhihui, Xue Jiang, and Lu Liu. "Multi-Party Quantum Secret Sharing Based on GHZ State." Entropy 24, no. 10 (October 8, 2022): 1433. http://dx.doi.org/10.3390/e24101433.

Full text
Abstract:
In this paper, we propose an efficient multi-party quantum secret sharing scheme based on GHZ entangled state. The participants in this scheme are divided into two groups, and share secrets as a group. There is no need to exchange any measurement information between the two groups, reducing the security problems caused by the communication process. Each participant holds one particle from each GHZ state; it can be found that the particles of each GHZ state are related after measuring them, and the eavesdropping detection can detect external attacks based on this characteristic. Furthermore, since the participants within the two groups encode the measured particles, they can recover the same secrets. Security analysis shows that the protocol can resist the intercept-and-resend attack and entanglement measurement attack, and the simulation results show that the probability of an external attacker being detected is proportional to the amount of information he can obtain. Compared with the existing protocols, this proposed protocol is more secure, has less quantum resources and is more practical.
APA, Harvard, Vancouver, ISO, and other styles
31

Wu, Zhen, Yining Liu, and Xingxing Jia. "A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management." Mathematics 8, no. 3 (March 19, 2020): 448. http://dx.doi.org/10.3390/math8030448.

Full text
Abstract:
With the spread of the Internet, the speed of data spread is getting faster and faster. It benefits us a lot but also brings us many potential security problems, especially the problem of privacy leakage. For example, more and more people choose to store their private images in the cloud. Secret image sharing as a significant method has been widely applied in protecting images in the cloud, which reduces the risks of data leakage and data loss. Generally, the secret image sharing scheme would encrypt the secret image into a series of shares and then stored these shares in a cloud. However, when this cloud has been attacked, the secret may meet a risk of leakage. A solution to solve the problem is that the generated shares are distributed storage in multiple clouds. Each cloud is independent and all clouds can have a collaboration to manage the secret image. To address this issue, a novel hierarchical secret image sharing scheme with multi-group joint management is proposed in this paper, which is suitable for protecting the security of the secret image by distributed storage over multiple clouds. In the proposed scheme, the secret image would be shared among multiple groups with different thresholds. The number of each group’s shareholders is determined by a sequence of thresholds. Therefore, the proposed scheme is a hierarchical secret image sharing scheme in which the secret image can be reconstructed if and only if the number of shares has met all threshold conditions. In addition, the generated shares have the same weight, which is more suitable for universal applicability. Both the system analysis and the simulation results prove that the proposed scheme is efficient and practical.
APA, Harvard, Vancouver, ISO, and other styles
32

Lin, Changlu, Huidan Hu, Chin-Chen Chang, and Shaohua Tang. "A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction." IEEE Access 6 (2018): 70666–73. http://dx.doi.org/10.1109/access.2018.2880975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

ZOU, Hui, and Jian-dong WANG. "Multi-level threshold multi-secret sharing scheme with proactive security." Journal of Computer Applications 29, no. 8 (October 9, 2009): 2218–19. http://dx.doi.org/10.3724/sp.j.1087.2009.02218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

MAN, ZHONG-XIAO, YUN-JIE XIA, and ZHAN-JUN ZHANG. "MANY-AGENT CONTROLLED MULTI-PLAYER QUANTUM SECRET SHARING SCHEME." International Journal of Modern Physics C 18, no. 02 (February 2007): 177–85. http://dx.doi.org/10.1142/s0129183107010528.

Full text
Abstract:
In this paper, we propose a scheme of many-agent controlled multi-player quantum secret sharing. The players are some filed performers to implement a task by using the secret messages from a supremo, while the agents may be the players' superiors who hold the controls also from the supremo and can manipulate the task by using the controls. In the scheme only Bell states are employed and need to be identified, which implies that it is more easily implemented with today's technique.
APA, Harvard, Vancouver, ISO, and other styles
35

XIAO, Liangliang. "Linear multi-secret sharing schemes." Science in China Series F 48, no. 1 (2005): 125. http://dx.doi.org/10.1360/03yf0599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Lin, Cheng-Shian, Chien-Chang Chen, and Yu-Cheng Chen. "XOR-Based Progressively Secret Image Sharing." Mathematics 9, no. 6 (March 12, 2021): 612. http://dx.doi.org/10.3390/math9060612.

Full text
Abstract:
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily. However, how to recover secret images with progressive steps is not addressed. In this study, we proposed an XOR-based (m, t, Ti) multi-secret image sharing scheme that shares m secret images among m participants and recovers m shared images progressively with t thresholds. The proposed secret images partition strategy (SIPS) partitions m secret images to generate intermediate images for different thresholds in the sharing procedure. Based on progressive recovery property, the proposed recovery method recovers parts of the secret images by gathering consecutive shared images. Moreover, gathering all shared images can perfectly recover all secret images. The experimental results show that the proposed XOR-based multi-secret image sharing method has high security and efficiency.
APA, Harvard, Vancouver, ISO, and other styles
37

Ha, Yan Yan, Shuai Ji, Wen Cai He, and Yao Zhang. "Multi-Secret Sharing Visual Cryptography Scheme Based on XOR Algorithm." Applied Mechanics and Materials 644-650 (September 2014): 2108–11. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2108.

Full text
Abstract:
XOR algorithm can be used to improve the recovery effects of visual cryptography scheme. In this paper, we present a multi-secret visual cryptography scheme by using the matrices of the (k, k)-VCS. We can reveal multiple secret images perfectly by the XOR algorithm and shifting operation on the shares. The visual qualities of recovered images are ideal without any pixel expansion.
APA, Harvard, Vancouver, ISO, and other styles
38

Fu, Zheng Xin, and Bin Yu. "A Modified Multi-Secret Visual Cryptography with Ring Shares." Advanced Engineering Forum 6-7 (September 2012): 343–49. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.343.

Full text
Abstract:
A visual cryptography scheme encoding multiple secret images into two ring shares is proposed in this paper. In the secret sharing process, two shares are produced by the marked areas and the basis matrices of (2, 2)-VCS. Using ring shift right function, the secret images are recovered by stacking two shares. The security and contrast properties of the scheme have been proved. Compared with the previous ones, the scheme makes the number of secret images unlimited. Furthermore, the pixel expansion and the relative difference are improved greatly.
APA, Harvard, Vancouver, ISO, and other styles
39

Yang, Yu Guang, and Hai Ping Chai. "A Trusted Multi-Party Authentication Scheme Based on Proactive-ElGamal Threshold Secret Sharing System." Applied Mechanics and Materials 235 (November 2012): 20–24. http://dx.doi.org/10.4028/www.scientific.net/amm.235.20.

Full text
Abstract:
In most existing authentication schemes users are authenticated by the server one by one which results in lower efficiency of authentication when the number of users is large. Aiming at the drawback, this paper propose an efficient trusted multi-party authentication scheme based on threshold secret sharing, the discrete logarithm problem and ElGamal cryptosystem. Using (t,n) threshold secret sharing idea, the paper propose a (t,n) threshold authentication scheme which can not only simultaneously authenticate t users satisfying some specific conditions, but also authenticate new users dynamically by distributing a new authentication key for the new user which was produced by t old users and the new user together. Finally, the security and efficiency of the proposed scheme are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
40

Qin, Huawang, and Raylin Tso. "High-capacity quantum secret sharing based on orbital angular momentum." Quantum Information and Computation 18, no. 7&8 (June 2018): 579–91. http://dx.doi.org/10.26421/qic18.7-8-3.

Full text
Abstract:
A high-capacity quantum secret sharing scheme based on orbital angular momentum is proposed. The dealer uses single particles in the orbital angular momentum (OAM) basis to bring the secret and encodes the secret through performing the transformation between the orbital angular momentum (OAM) basis and the angular position (ANG) basis. In the recovery, the participants perform the single-particle measurements to reconstruct the secret. The proposed scheme can use the multi-dimension of OAM to reach higher information capacity and enhanced security.
APA, Harvard, Vancouver, ISO, and other styles
41

PANG, Liao-Jun, Qing-Qi PEI, Li-Cheng JIAO, and Yu-Min WANG. "An Identity (ID)-Based Threshold Multi-Secret Sharing Scheme." Journal of Software 19, no. 10 (October 20, 2008): 2739–45. http://dx.doi.org/10.3724/sp.j.1001.2008.02739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Wu, Tsu-Yang, and Yuh-Min Tseng. "Publicly verifiable multi-secret sharing scheme from bilinear pairings." IET Information Security 7, no. 3 (September 1, 2013): 239–46. http://dx.doi.org/10.1049/iet-ifs.2012.0105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Chien-Chang, and Wei-Jie Wu. "A secure Boolean-based multi-secret image sharing scheme." Journal of Systems and Software 92 (June 2014): 107–14. http://dx.doi.org/10.1016/j.jss.2014.01.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Yu, Ying, Hongliang Cai, Dan Tang, and Wei Yuan. "Multi-secret Image Sharing Scheme based on coding method." IOP Conference Series: Materials Science and Engineering 631 (November 7, 2019): 052043. http://dx.doi.org/10.1088/1757-899x/631/5/052043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Nag, Amitava, Jyoti Prakash Singh, and Amit Kumar Singh. "An efficient Boolean based multi-secret image sharing scheme." Multimedia Tools and Applications 79, no. 23-24 (June 7, 2019): 16219–43. http://dx.doi.org/10.1007/s11042-019-07807-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Martín del Rey, A. "A multi-secret sharing scheme for 3D solid objects." Expert Systems with Applications 42, no. 4 (March 2015): 2114–20. http://dx.doi.org/10.1016/j.eswa.2014.10.035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Hsu, Ching-Fang, Qi Cheng, Xueming Tang, and Bing Zeng. "An ideal multi-secret sharing scheme based on MSP." Information Sciences 181, no. 7 (April 1, 2011): 1403–9. http://dx.doi.org/10.1016/j.ins.2010.11.032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Li, Bin. "Bipartite Threshold Multi-Secret Sharing Scheme Based on Hypersphere." American Journal of Computational Mathematics 09, no. 04 (2019): 207–20. http://dx.doi.org/10.4236/ajcm.2019.94016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Chen, Chien-Chang, Wei-Jie Wu, and Jun-Long Chen. "Highly efficient and secure multi-secret image sharing scheme." Multimedia Tools and Applications 75, no. 12 (May 3, 2015): 7113–28. http://dx.doi.org/10.1007/s11042-015-2634-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

N, Rukma Rekha, Rolla Subrahmanyam, and Subba Rao Y.V. "Multi Group Key Agreement Protocol Using Secret Sharing Scheme." International Journal of Security and Networks 1, no. 1 (2023): 1. http://dx.doi.org/10.1504/ijsn.2023.10056277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography