Journal articles on the topic 'MULTI SECRET SHARING SCHEME'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'MULTI SECRET SHARING SCHEME.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Endurthi, Anjaneyulu, Oinam B. Chanu, Appala N. Tentu, and V. Ch Venkaiah. "Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT." Journal of Communications Software and Systems 11, no. 1 (March 23, 2015): 15. http://dx.doi.org/10.24138/jcomss.v11i1.113.
Full textZHANG, EN, and YONGQUAN CAI. "RATIONAL MULTI-SECRET SHARING SCHEME IN STANDARD POINT-TO-POINT COMMUNICATION NETWORKS." International Journal of Foundations of Computer Science 24, no. 06 (September 2013): 879–97. http://dx.doi.org/10.1142/s012905411350024x.
Full textCai, Hongliang, and Dan Tang. "Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares." Mathematics 8, no. 9 (September 14, 2020): 1582. http://dx.doi.org/10.3390/math8091582.
Full textJuan, Justie Su-Tzu, Jen-Yu Lin, Bo-Yuan Huang, and Yu-Chun Chung. "Advanced fault-tolerant visual multi-secret sharing scheme." Journal of Surveillance, Security and Safety 3 (2022): 41–54. http://dx.doi.org/10.20517/jsss.2021.29.
Full textLuo, Shuangshuang, Zhihui Li, Depeng Meng, and Jiansheng Guo. "Efficient quantum secret sharing scheme based on monotone span program." Laser Physics 33, no. 8 (June 22, 2023): 085201. http://dx.doi.org/10.1088/1555-6611/acd630.
Full textXu, Guoai, Jiangtao Yuan, Guosheng Xu, and Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier." Information Technology and Control 50, no. 2 (June 17, 2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.
Full textChen, Chien-Chang, Cheng-Shian Lin, and Jia-Zhan Chen. "Boolean-Based (k, n, m) Multi-Secret Image Sharing." Axioms 11, no. 5 (April 23, 2022): 197. http://dx.doi.org/10.3390/axioms11050197.
Full textCsirmaz, Laszlo. "Secret sharing and duality." Journal of Mathematical Cryptology 15, no. 1 (November 25, 2020): 157–73. http://dx.doi.org/10.1515/jmc-2019-0045.
Full textChang, Joy, Bo-Yuan Huang, and Justie Juan. "A New Visual Multi-Secrets Sharing Scheme by Random Grids." Cryptography 2, no. 3 (September 17, 2018): 24. http://dx.doi.org/10.3390/cryptography2030024.
Full textHwang, Ren-Junn, and Chin-Chen Chang. "An on-line secret sharing scheme for multi-secrets." Computer Communications 21, no. 13 (September 1998): 1170–76. http://dx.doi.org/10.1016/s0140-3664(98)00191-1.
Full textChoudhary, Shipra PraveenKumar, Apeksha Katarni, Shweta Manjrekar, Mrs Vidyullata Devmane, and Mrs Vaishali Hirlekar. "Secret Sharing Approach in Multi-database System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 6 (April 20, 2016): 6819–23. http://dx.doi.org/10.24297/ijct.v15i6.1606.
Full textQin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Secret Sharing Scheme on Access Structure." Applied Mechanics and Materials 571-572 (June 2014): 63–68. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.63.
Full textLin, Yan, Hongliang Zhu, Guoai Xu, and Guosheng Xu. "Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations." International Journal of Distributed Sensor Networks 18, no. 3 (March 2022): 155013292210887. http://dx.doi.org/10.1177/15501329221088740.
Full textEslamia, Khadijeh, and Mojtaba Bahramiana. "An isogeny-based quantum-resistant secret sharing scheme." Filomat 36, no. 10 (2022): 3249–58. http://dx.doi.org/10.2298/fil2210249e.
Full textMAO, Ying-ying, Ming MAO, and Yan-shuo ZHANG. "Verifiable hierarchical threshold multi-secret sharing scheme." Journal of Computer Applications 29, no. 1 (June 25, 2009): 172–74. http://dx.doi.org/10.3724/sp.j.1087.2009.00172.
Full textWANG, Wei, and Shun-xian ZHOU. "Multi-secret sharing scheme among weighted participants." Journal of Computer Applications 30, no. 12 (January 6, 2011): 3334–36. http://dx.doi.org/10.3724/sp.j.1087.2010.03334.
Full textWang, Jian, Yanheng Liu, and Yanxi Wang. "On Novel Verifiable Multi-Secret Sharing Scheme." Advanced Science Letters 4, no. 11 (November 1, 2011): 3709–15. http://dx.doi.org/10.1166/asl.2011.1259.
Full textYang, Chou-Chen, Ting-Yi Chang, and Min-Shiang Hwang. "A (t,n) multi-secret sharing scheme." Applied Mathematics and Computation 151, no. 2 (April 2004): 483–90. http://dx.doi.org/10.1016/s0096-3003(03)00355-2.
Full textMishra, Abhishek, and Ashutosh Gupta. "Multi secret sharing scheme using iterative method." Journal of Information and Optimization Sciences 39, no. 3 (April 3, 2018): 631–41. http://dx.doi.org/10.1080/02522667.2017.1385161.
Full textZhao, Jianjie, Jianzhong Zhang, and Rong Zhao. "A practical verifiable multi-secret sharing scheme." Computer Standards & Interfaces 29, no. 1 (January 2007): 138–41. http://dx.doi.org/10.1016/j.csi.2006.02.004.
Full textChan, Chao-Wen, and Chin-Chen Chang. "A scheme for threshold multi-secret sharing." Applied Mathematics and Computation 166, no. 1 (July 2005): 1–14. http://dx.doi.org/10.1016/j.amc.2004.04.081.
Full textPang, Liao-Jun, and Yu-Min Wang. "A new (t,n) multi-secret sharing scheme based on Shamir’s secret sharing." Applied Mathematics and Computation 167, no. 2 (August 2005): 840–48. http://dx.doi.org/10.1016/j.amc.2004.06.120.
Full textZhou, Jun, and Zhen Yu Yang. "Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme." Applied Mechanics and Materials 411-414 (September 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.141.
Full textMesnager, Sihem, Ahmet Sınak, and Oğuz Yayla. "Threshold-Based Post-Quantum Secure Verifiable Multi-Secret Sharing for Distributed Storage Blockchain." Mathematics 8, no. 12 (December 14, 2020): 2218. http://dx.doi.org/10.3390/math8122218.
Full textQin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Leakproof Secret Sharing Scheme Based on Environment Sensing." Applied Mechanics and Materials 665 (October 2014): 647–53. http://dx.doi.org/10.4028/www.scientific.net/amm.665.647.
Full textYu, Bin, Gang Shen, and Zheng-xin Fu. "A Lossless Multi-secret Sharing Visual Cryptography Scheme." Journal of Electronics & Information Technology 34, no. 12 (July 11, 2013): 2885–90. http://dx.doi.org/10.3724/sp.j.1146.2012.00300.
Full textYang, Ching-Nung, Cheng-Hua Chen, and Song-Ruei Cai. "Enhanced Boolean-based multi secret image sharing scheme." Journal of Systems and Software 116 (June 2016): 22–34. http://dx.doi.org/10.1016/j.jss.2015.01.031.
Full textXiao, Heling, and Jingliang Gao. "Multi-party d-Level Quantum Secret Sharing Scheme." International Journal of Theoretical Physics 52, no. 6 (January 11, 2013): 2075–82. http://dx.doi.org/10.1007/s10773-012-1481-3.
Full textWang, Feng, You-sheng Zhou, and Dao-feng Li. "Dynamic threshold changeable multi-policy secret sharing scheme." Security and Communication Networks 8, no. 18 (June 4, 2015): 3653–58. http://dx.doi.org/10.1002/sec.1288.
Full textLi, Zhihui, Xue Jiang, and Lu Liu. "Multi-Party Quantum Secret Sharing Based on GHZ State." Entropy 24, no. 10 (October 8, 2022): 1433. http://dx.doi.org/10.3390/e24101433.
Full textWu, Zhen, Yining Liu, and Xingxing Jia. "A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management." Mathematics 8, no. 3 (March 19, 2020): 448. http://dx.doi.org/10.3390/math8030448.
Full textLin, Changlu, Huidan Hu, Chin-Chen Chang, and Shaohua Tang. "A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction." IEEE Access 6 (2018): 70666–73. http://dx.doi.org/10.1109/access.2018.2880975.
Full textZOU, Hui, and Jian-dong WANG. "Multi-level threshold multi-secret sharing scheme with proactive security." Journal of Computer Applications 29, no. 8 (October 9, 2009): 2218–19. http://dx.doi.org/10.3724/sp.j.1087.2009.02218.
Full textMAN, ZHONG-XIAO, YUN-JIE XIA, and ZHAN-JUN ZHANG. "MANY-AGENT CONTROLLED MULTI-PLAYER QUANTUM SECRET SHARING SCHEME." International Journal of Modern Physics C 18, no. 02 (February 2007): 177–85. http://dx.doi.org/10.1142/s0129183107010528.
Full textXIAO, Liangliang. "Linear multi-secret sharing schemes." Science in China Series F 48, no. 1 (2005): 125. http://dx.doi.org/10.1360/03yf0599.
Full textLin, Cheng-Shian, Chien-Chang Chen, and Yu-Cheng Chen. "XOR-Based Progressively Secret Image Sharing." Mathematics 9, no. 6 (March 12, 2021): 612. http://dx.doi.org/10.3390/math9060612.
Full textHa, Yan Yan, Shuai Ji, Wen Cai He, and Yao Zhang. "Multi-Secret Sharing Visual Cryptography Scheme Based on XOR Algorithm." Applied Mechanics and Materials 644-650 (September 2014): 2108–11. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2108.
Full textFu, Zheng Xin, and Bin Yu. "A Modified Multi-Secret Visual Cryptography with Ring Shares." Advanced Engineering Forum 6-7 (September 2012): 343–49. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.343.
Full textYang, Yu Guang, and Hai Ping Chai. "A Trusted Multi-Party Authentication Scheme Based on Proactive-ElGamal Threshold Secret Sharing System." Applied Mechanics and Materials 235 (November 2012): 20–24. http://dx.doi.org/10.4028/www.scientific.net/amm.235.20.
Full textQin, Huawang, and Raylin Tso. "High-capacity quantum secret sharing based on orbital angular momentum." Quantum Information and Computation 18, no. 7&8 (June 2018): 579–91. http://dx.doi.org/10.26421/qic18.7-8-3.
Full textPANG, Liao-Jun, Qing-Qi PEI, Li-Cheng JIAO, and Yu-Min WANG. "An Identity (ID)-Based Threshold Multi-Secret Sharing Scheme." Journal of Software 19, no. 10 (October 20, 2008): 2739–45. http://dx.doi.org/10.3724/sp.j.1001.2008.02739.
Full textWu, Tsu-Yang, and Yuh-Min Tseng. "Publicly verifiable multi-secret sharing scheme from bilinear pairings." IET Information Security 7, no. 3 (September 1, 2013): 239–46. http://dx.doi.org/10.1049/iet-ifs.2012.0105.
Full textChen, Chien-Chang, and Wei-Jie Wu. "A secure Boolean-based multi-secret image sharing scheme." Journal of Systems and Software 92 (June 2014): 107–14. http://dx.doi.org/10.1016/j.jss.2014.01.001.
Full textYu, Ying, Hongliang Cai, Dan Tang, and Wei Yuan. "Multi-secret Image Sharing Scheme based on coding method." IOP Conference Series: Materials Science and Engineering 631 (November 7, 2019): 052043. http://dx.doi.org/10.1088/1757-899x/631/5/052043.
Full textNag, Amitava, Jyoti Prakash Singh, and Amit Kumar Singh. "An efficient Boolean based multi-secret image sharing scheme." Multimedia Tools and Applications 79, no. 23-24 (June 7, 2019): 16219–43. http://dx.doi.org/10.1007/s11042-019-07807-7.
Full textMartín del Rey, A. "A multi-secret sharing scheme for 3D solid objects." Expert Systems with Applications 42, no. 4 (March 2015): 2114–20. http://dx.doi.org/10.1016/j.eswa.2014.10.035.
Full textHsu, Ching-Fang, Qi Cheng, Xueming Tang, and Bing Zeng. "An ideal multi-secret sharing scheme based on MSP." Information Sciences 181, no. 7 (April 1, 2011): 1403–9. http://dx.doi.org/10.1016/j.ins.2010.11.032.
Full textLi, Bin. "Bipartite Threshold Multi-Secret Sharing Scheme Based on Hypersphere." American Journal of Computational Mathematics 09, no. 04 (2019): 207–20. http://dx.doi.org/10.4236/ajcm.2019.94016.
Full textChen, Chien-Chang, Wei-Jie Wu, and Jun-Long Chen. "Highly efficient and secure multi-secret image sharing scheme." Multimedia Tools and Applications 75, no. 12 (May 3, 2015): 7113–28. http://dx.doi.org/10.1007/s11042-015-2634-1.
Full textN, Rukma Rekha, Rolla Subrahmanyam, and Subba Rao Y.V. "Multi Group Key Agreement Protocol Using Secret Sharing Scheme." International Journal of Security and Networks 1, no. 1 (2023): 1. http://dx.doi.org/10.1504/ijsn.2023.10056277.
Full text