Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: MULTI SECRET SHARING SCHEME.

Статті в журналах з теми "MULTI SECRET SHARING SCHEME"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "MULTI SECRET SHARING SCHEME".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Endurthi, Anjaneyulu, Oinam B. Chanu, Appala N. Tentu, and V. Ch Venkaiah. "Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT." Journal of Communications Software and Systems 11, no. 1 (March 23, 2015): 15. http://dx.doi.org/10.24138/jcomss.v11i1.113.

Повний текст джерела
Анотація:
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8]. The first scheme that uses the Mignotte’s sequence is a single secret scheme; the second one is an extension of the first one to Multi-secret sharing scheme. The third scheme is again for the case of multi-secrets but it is an improvement over the second scheme in the sense that it reduces the number of publicvalues. The first scheme that uses the Asmuth-Bloom sequence is designed for the case of a single secret and the second one is an extension of the first scheme to the case of multi-secrets. Novelty of the proposed schemes is that the shares of the participants are reusable i.e. same shares are applicable even with a new secret. Also only one share needs to be kept by each participant even for the muslti-secret sharing scheme. Further, the schemes are capable of verifying the honesty of the participants including the dealer. Correctness of the proposed schemes is discussed and show that the proposed schemes are computationally secure.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

ZHANG, EN, and YONGQUAN CAI. "RATIONAL MULTI-SECRET SHARING SCHEME IN STANDARD POINT-TO-POINT COMMUNICATION NETWORKS." International Journal of Foundations of Computer Science 24, no. 06 (September 2013): 879–97. http://dx.doi.org/10.1142/s012905411350024x.

Повний текст джерела
Анотація:
Rational secret sharing was first introduced by Halpern and Teague (STOC, 2004). Since then, a series of works have focused on designing rational secret sharing protocols. However, most existing solutions can share only one secret at one secret sharing process. To share multiple secrets such as m secrets, the dealer must redistribute shares for m times. In addition, previous works assume existence of broadcast channel which is not realistic. Motivated by those problems, this paper proposes a rational multi-secret sharing scheme, which combines the secret sharing scheme with game theory. In the protocol, the problem of sharing multiple secrets is addressed, and there are multiple secrets to be shared during one secret sharing process. Furthermore, this work starts off by constructing a protocol in simultaneous broadcast networks, and then we emulate the broadcast channel over point-to-point networks. Based on a computational assumption, we show that rational players have no incentive to deviate from the protocol and every player can obtain multi-secret fairly.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Cai, Hongliang, and Dan Tang. "Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares." Mathematics 8, no. 9 (September 14, 2020): 1582. http://dx.doi.org/10.3390/math8091582.

Повний текст джерела
Анотація:
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex algebraic-based methods, which can realize the sharing of multi secret images. However, the existing Boolean-based multi secret sharing schemes are mostly restricted to the particular case of (2, n) and (n, n), only few Boolean-based multi secret sharing schemes study the general access structure, and the shares are mostly meaningless. In this paper, a new Boolean-based multi secret sharing scheme with the general access structure is proposed. All the shares are meaningful, which can avoid attracting the attention of adversaries, and the secret images can be recovered in a lossless manner. The feasibility of the scheme is proven, the performance is validated by the experiments on the gray images, and the analysis of the comparison with other methods is also given out.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Juan, Justie Su-Tzu, Jen-Yu Lin, Bo-Yuan Huang, and Yu-Chun Chung. "Advanced fault-tolerant visual multi-secret sharing scheme." Journal of Surveillance, Security and Safety 3 (2022): 41–54. http://dx.doi.org/10.20517/jsss.2021.29.

Повний текст джерела
Анотація:
Aim: In visual cryptography, a secret image is encrypted into two meaningless random images called shares. These two shares can be stacked to recover the secret image without any calculations. However, because of the alignment problem in the decryption phase, risk of poor quality of the restored image exists. Encrypting multiple secrets on two images simultaneously can improve execution efficiency. Methods: Let 7 × 7 pixels be a unit; this paper designs a codebook for any unit in the secret images by using a random grid. Besides, this paper shows a general shifting approach that can embed N (≥ 2) secret images simultaneously with adjustable distortion. Results: This paper provides a visual multi-secret sharing scheme without pixel expansion; the proposed scheme can encrypt more than two secret images into two shares simultaneously. During decoding, aligning the shares precisely is not necessary. Conclusion: Theoretical analysis and simulation results indicate the effectiveness and practicality of the proposed scheme.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Luo, Shuangshuang, Zhihui Li, Depeng Meng, and Jiansheng Guo. "Efficient quantum secret sharing scheme based on monotone span program." Laser Physics 33, no. 8 (June 22, 2023): 085201. http://dx.doi.org/10.1088/1555-6611/acd630.

Повний текст джерела
Анотація:
Abstract How to efficiently share secrets among multiple participants is a very important problem in key management. In this paper, we propose a multi-secret sharing scheme based on the Greenberger Horne Zeilinger (GHZ) state. First, the distributor uses monotone span program to encode the secrets and generate the corresponding secret shares to send to the participants. Then, each participant uses the generalized Pauli operator to embed its own secret share into the transmitted particle. The participant who wants to get the secrets can get multiple secrets at the same time by performing a GHZ-state joint measurement. Furthermore, since this scheme is based on a monotone span program, its access structure is more general than the access structure (t, n) threshold. Compared with other schemes, our proposed scheme is more efficient, less computational cost.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Xu, Guoai, Jiangtao Yuan, Guosheng Xu, and Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier." Information Technology and Control 50, no. 2 (June 17, 2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.

Повний текст джерела
Анотація:
Multi-stage secret sharing scheme is practical in the case that there is a security system with m ordered checkpoints.It is natural to divide the m checkpoints into m different levels. There are m different secrets, and eachof them with a different importance corresponds to a checkpoint/level. The participants are also divided intom disjoint levels as they do in the hierarchical threshold access structure. Hierarchical threshold access structurewith the existential quantifier ( HTAS∃ ) does not cover the common practice that at least a few numbersof high-ranking participants are required to be involved in any recovery of the secret. The popular schemeswith hierarchical access structure were needed to check many matrices for non-singularity. We propose amulti-stage secret sharing scheme for HTAS∃ , and the tools are based on the linear homogeneous recurrencerelations (LHRRs) and one-way functions. We give the HTAS∃ a modification, so that this hierarchical accessstructure can satisfy the common practice. In our scheme, if the participants are divided into m levels, thereusually has m secrets. But before the (j − 1)-th secret is recovered, the j-th secret cannot be recovered. Ourscheme is a computational secure. The proposed scheme requires a share for each participant and the shareis as long as each secret. Our scheme has high efficiency by comparing with the state-of-the-art hierarchicalsecret sharing schemes.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Chen, Chien-Chang, Cheng-Shian Lin, and Jia-Zhan Chen. "Boolean-Based (k, n, m) Multi-Secret Image Sharing." Axioms 11, no. 5 (April 23, 2022): 197. http://dx.doi.org/10.3390/axioms11050197.

Повний текст джерела
Анотація:
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property. Simultaneously, the adopted Boolean method preserves high performance. The proposed (k, n, m) multi-secret image sharing scheme shares m secret images among n participants and gathering k participants’ shared images perfectly recovers these m secret images. The proposed scheme exhibits high performance because of the usage of Boolean-based processing. Moreover, the usage of a sharing matrix based strategy acquires perfect reconstruction of the secret images under (k, n) thresholds. Two proposed schemes, the source-random-mixed (SRM) and the source-random-separate (SRS) methods, are presented in this study from different strategies of sharing the random image mixed with the secret images or separated to the secret images, respectively. Moreover, the proposed SRS method exhibits the better sharing capacity. Experimental results show that the proposed schemes perform well on sharing efficiency and security.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Csirmaz, Laszlo. "Secret sharing and duality." Journal of Mathematical Cryptology 15, no. 1 (November 25, 2020): 157–73. http://dx.doi.org/10.1515/jmc-2019-0045.

Повний текст джерела
Анотація:
AbstractSecret sharing is an important building block in cryptography. All explicit secret sharing schemes which are known to have optimal complexity are multi-linear, thus are closely related to linear codes. The dual of such a linear scheme, in the sense of duality of linear codes, gives another scheme for the dual access structure. These schemes have the same complexity, namely the largest share size relative to the secret size is the same. It is a long-standing open problem whether this fact is true in general: the complexity of any access structure is the same as the complexity of its dual. We give a partial answer to this question. An almost perfect scheme allows negligible errors, both in the recovery and in the independence. There exists an almost perfect ideal scheme on 174 participants whose complexity is strictly smaller than that of its dual.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Chang, Joy, Bo-Yuan Huang, and Justie Juan. "A New Visual Multi-Secrets Sharing Scheme by Random Grids." Cryptography 2, no. 3 (September 17, 2018): 24. http://dx.doi.org/10.3390/cryptography2030024.

Повний текст джерела
Анотація:
In (2, 2)-visual secret sharing (VSS) schemes, a common type of (k, n)-threshold VSS schemes, secret information can be decoded directly through only two shares by using a human vision system. Several studies have analyzed methods of simplifying the decoding process and refining encoding to pass more secret images through two identical shares. However, limited secret images are retrieved, and the quality of the recovered images is low. This paper proposes an advanced (2, 2)-VSS scheme that can embed N secret images into two rectangular shares. Compared with other related VSS schemes, more secret images can be encrypted and the distortion is adjustable in the proposed scheme, yielding more flexibility in theory and practice.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hwang, Ren-Junn, and Chin-Chen Chang. "An on-line secret sharing scheme for multi-secrets." Computer Communications 21, no. 13 (September 1998): 1170–76. http://dx.doi.org/10.1016/s0140-3664(98)00191-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Choudhary, Shipra PraveenKumar, Apeksha Katarni, Shweta Manjrekar, Mrs Vidyullata Devmane, and Mrs Vaishali Hirlekar. "Secret Sharing Approach in Multi-database System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 6 (April 20, 2016): 6819–23. http://dx.doi.org/10.24297/ijct.v15i6.1606.

Повний текст джерела
Анотація:
Secret sharing schemes are ideal for storing highly sensitive data. A secret is divided into many parts and every participant gets his unique part. If we combine all of these parts and try regenerating the secret then it might be impractical, and therefore the threshold scheme is used. Shamir’s secret sharing scheme supports the same. Here, some of the parts or all of them are required to reconstruct the secret. Any threshold number of parts are sufficient to reconstruct the original secret. The Admin has a set of files which are confidentiality and availability of data. Whenever a Client requests to access the files, the Admin performs authentication of the user through an encrypted and stored on multiple databases so as to achieve Authentication module, who makes use if Shamir's secret sharing concept. This is similar to the One Time Password (OTP) mechanism. If the Client is authentic, Admin grants him the decryption key and the Client can access the file. In this paper, we shall discuss all this in detail using which we can provide security, replication of data and authentication.Â
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Qin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Secret Sharing Scheme on Access Structure." Applied Mechanics and Materials 571-572 (June 2014): 63–68. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.63.

Повний текст джерела
Анотація:
A secret sharing scheme on access structure is proposed basing on the Lagrange interpolation, in which any extra information for each qualified subset is not needed, and each participant only needs to keep one shadow. Besides, the proposed scheme can be used to share multi-secret. Compared to the existing schemes, the proposed scheme is more simple, and easy to be applied in practice.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Lin, Yan, Hongliang Zhu, Guoai Xu, and Guosheng Xu. "Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations." International Journal of Distributed Sensor Networks 18, no. 3 (March 2022): 155013292210887. http://dx.doi.org/10.1177/15501329221088740.

Повний текст джерела
Анотація:
Wireless sensor network is a key technology in the sensing layer of the Internet of Things. Data security in wireless sensor network is directly related to the authenticity and validity of data transmitted in the Internet of Things. Due to the large number and different types of nodes in wireless sensor networks, layered secret key sharing technology is increasingly used in wireless sensor networks. In a hierarchical secret sharing scheme, participants are divided into sections with different permissions for each team, but the same permissions for participants in the same team. In this article, we follow the approach of the hierarchical secret sharing scheme derived from the linear homogeneous recurrence relations. We design a hierarchical multi-secret sharing scheme for wireless sensor networks on the basis of the elliptic curve public key cryptosystem combined with the linear homogeneous recurrence relations. In the proposed scheme, we do not make sure that the participants are half-truthful. In addition, the participants’ shadows can be reused. Our scheme is computational security. Only one share from each member is required in our hierarchical multi-secret sharing scheme. It is more suitable for wireless sensor networks compared to the up-to-date schemes.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Eslamia, Khadijeh, and Mojtaba Bahramiana. "An isogeny-based quantum-resistant secret sharing scheme." Filomat 36, no. 10 (2022): 3249–58. http://dx.doi.org/10.2298/fil2210249e.

Повний текст джерела
Анотація:
In a secret sharing scheme, a secret is distributed among several participants in such a way that only any authorized subset of participants is able to recover the secret. So far, the security of many secret sharing schemes has been based on the hardness of some mathematical problems, such as discrete logarithm and factorization. These problems can be solved in polynomial time using Shor?s algorithm for a quantum computer. In this paper, we propose an efficient multi-secret sharing scheme based on the hardness of computing isogenies between supersingular elliptic curves. The proposed scheme is based on De Feo and Jao key exchange protocol. We prove that our scheme is secure under computational assumptions in which there is no known efficient quantum algorithm.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

MAO, Ying-ying, Ming MAO, and Yan-shuo ZHANG. "Verifiable hierarchical threshold multi-secret sharing scheme." Journal of Computer Applications 29, no. 1 (June 25, 2009): 172–74. http://dx.doi.org/10.3724/sp.j.1087.2009.00172.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

WANG, Wei, and Shun-xian ZHOU. "Multi-secret sharing scheme among weighted participants." Journal of Computer Applications 30, no. 12 (January 6, 2011): 3334–36. http://dx.doi.org/10.3724/sp.j.1087.2010.03334.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Wang, Jian, Yanheng Liu, and Yanxi Wang. "On Novel Verifiable Multi-Secret Sharing Scheme." Advanced Science Letters 4, no. 11 (November 1, 2011): 3709–15. http://dx.doi.org/10.1166/asl.2011.1259.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Yang, Chou-Chen, Ting-Yi Chang, and Min-Shiang Hwang. "A (t,n) multi-secret sharing scheme." Applied Mathematics and Computation 151, no. 2 (April 2004): 483–90. http://dx.doi.org/10.1016/s0096-3003(03)00355-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Mishra, Abhishek, and Ashutosh Gupta. "Multi secret sharing scheme using iterative method." Journal of Information and Optimization Sciences 39, no. 3 (April 3, 2018): 631–41. http://dx.doi.org/10.1080/02522667.2017.1385161.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Zhao, Jianjie, Jianzhong Zhang, and Rong Zhao. "A practical verifiable multi-secret sharing scheme." Computer Standards & Interfaces 29, no. 1 (January 2007): 138–41. http://dx.doi.org/10.1016/j.csi.2006.02.004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Chan, Chao-Wen, and Chin-Chen Chang. "A scheme for threshold multi-secret sharing." Applied Mathematics and Computation 166, no. 1 (July 2005): 1–14. http://dx.doi.org/10.1016/j.amc.2004.04.081.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Pang, Liao-Jun, and Yu-Min Wang. "A new (t,n) multi-secret sharing scheme based on Shamir’s secret sharing." Applied Mathematics and Computation 167, no. 2 (August 2005): 840–48. http://dx.doi.org/10.1016/j.amc.2004.06.120.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Zhou, Jun, and Zhen Yu Yang. "Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme." Applied Mechanics and Materials 411-414 (September 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.141.

Повний текст джерела
Анотація:
The Internet of things is widespread concerned by the whole society now. As an important component of the Internet of things, wireless sensor network has wide application prospect in various fields such as medical and health, military defense. The traditional data privacy protection technology of PKI system used in the WSN networks has its own weakness. This paper presents the secret key sharing mechanism to protect data privacy. The secret key, remote node and base station used to communicate, was divided into multiple secrets. The multiple secrets were distributed in the nodes which connect directly to the base station node. Only through collect more than threshold number of multi-secret that can decrypt the communication data between the base station and the remote node. To be safer, we used digital watermarking technology to protect the data transmission between the base station and the aggregate node. These techniques combined with the data slice, homomorphism encryption technology to protect data privacy, construct a safe and efficient wireless sensor networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Mesnager, Sihem, Ahmet Sınak, and Oğuz Yayla. "Threshold-Based Post-Quantum Secure Verifiable Multi-Secret Sharing for Distributed Storage Blockchain." Mathematics 8, no. 12 (December 14, 2020): 2218. http://dx.doi.org/10.3390/math8122218.

Повний текст джерела
Анотація:
Blockchain systems store transaction data in the form of a distributed ledger where each node stores a copy of all data, which gives rise to storage issues. It is well-known that the tremendous storage and distribution of the block data are common problems in blockchain systems. In the literature, some types of secret sharing schemes are employed to overcome these problems. The secret sharing method is one of the most significant cryptographic protocols used to ensure the privacy of the data. The main purpose of this paper is to improve the recent distributed storage blockchain systems by proposing an alternative secret sharing method. We first propose a secure threshold verifiable multi-secret sharing scheme that has the verification and private communication steps based on post-quantum lattice-based hard problems. We then apply the proposed threshold scheme to the distributed storage blockchain (DSB) system to share transaction data at each block. In the proposed DSB system, we encrypt the data block with the AES-256 encryption algorithm before distributing it among nodes at each block, and both its secret key and the hash value of the block are privately shared among nodes simultaneously by the proposed scheme. Thereafter, in the DSB system, the encrypted data block is encoded by the Reed–Solomon code, and it is shared among nodes. We finally analyze the storage and recovery communication costs and the robustness of the proposed DSB system. We observe that our approach improves effectively the recovery communication cost and makes it more robust compared to the previous DSB systems. It also improves extremely the storage cost of the traditional blockchain systems. Furthermore, the proposed scheme brings to the DSB system the desirable properties such as verification process and secret communication without private channels in addition to the known properties of the schemes used in the previous DSB systems. As a result of the flexibility on the threshold parameter of the scheme, a diverse range of qualified subsets of nodes in the DSB system can privately recover the secret values.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Qin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Leakproof Secret Sharing Scheme Based on Environment Sensing." Applied Mechanics and Materials 665 (October 2014): 647–53. http://dx.doi.org/10.4028/www.scientific.net/amm.665.647.

Повний текст джерела
Анотація:
A leakproof secret sharing scheme based on environment sensing is proposed, in which the shadows of participants and the shared secret are leakproof, and can be used repeatedly. The counterfeit shadows of the participants and the authentication information of the shared secret can be changed dynamically basing on environment sensing. So the scheme is secure even against a mobile adversary. Besides, through introducing the concept of adversary structure and the transformation of access structure to adversary structure, the secret sharing on general access structure is realized. Compared to the existing schemes, our scheme is more secure and more flexible in practice. Our scheme is particularly suitable for the system which needs to run long time in the open, such as the wireless sensor network and the multi-robots, the property of leakproof based on environment sensing can improve the efficiency and security of these systems effectively.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Yu, Bin, Gang Shen, and Zheng-xin Fu. "A Lossless Multi-secret Sharing Visual Cryptography Scheme." Journal of Electronics & Information Technology 34, no. 12 (July 11, 2013): 2885–90. http://dx.doi.org/10.3724/sp.j.1146.2012.00300.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Yang, Ching-Nung, Cheng-Hua Chen, and Song-Ruei Cai. "Enhanced Boolean-based multi secret image sharing scheme." Journal of Systems and Software 116 (June 2016): 22–34. http://dx.doi.org/10.1016/j.jss.2015.01.031.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Xiao, Heling, and Jingliang Gao. "Multi-party d-Level Quantum Secret Sharing Scheme." International Journal of Theoretical Physics 52, no. 6 (January 11, 2013): 2075–82. http://dx.doi.org/10.1007/s10773-012-1481-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Wang, Feng, You-sheng Zhou, and Dao-feng Li. "Dynamic threshold changeable multi-policy secret sharing scheme." Security and Communication Networks 8, no. 18 (June 4, 2015): 3653–58. http://dx.doi.org/10.1002/sec.1288.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Li, Zhihui, Xue Jiang, and Lu Liu. "Multi-Party Quantum Secret Sharing Based on GHZ State." Entropy 24, no. 10 (October 8, 2022): 1433. http://dx.doi.org/10.3390/e24101433.

Повний текст джерела
Анотація:
In this paper, we propose an efficient multi-party quantum secret sharing scheme based on GHZ entangled state. The participants in this scheme are divided into two groups, and share secrets as a group. There is no need to exchange any measurement information between the two groups, reducing the security problems caused by the communication process. Each participant holds one particle from each GHZ state; it can be found that the particles of each GHZ state are related after measuring them, and the eavesdropping detection can detect external attacks based on this characteristic. Furthermore, since the participants within the two groups encode the measured particles, they can recover the same secrets. Security analysis shows that the protocol can resist the intercept-and-resend attack and entanglement measurement attack, and the simulation results show that the probability of an external attacker being detected is proportional to the amount of information he can obtain. Compared with the existing protocols, this proposed protocol is more secure, has less quantum resources and is more practical.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Wu, Zhen, Yining Liu, and Xingxing Jia. "A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management." Mathematics 8, no. 3 (March 19, 2020): 448. http://dx.doi.org/10.3390/math8030448.

Повний текст джерела
Анотація:
With the spread of the Internet, the speed of data spread is getting faster and faster. It benefits us a lot but also brings us many potential security problems, especially the problem of privacy leakage. For example, more and more people choose to store their private images in the cloud. Secret image sharing as a significant method has been widely applied in protecting images in the cloud, which reduces the risks of data leakage and data loss. Generally, the secret image sharing scheme would encrypt the secret image into a series of shares and then stored these shares in a cloud. However, when this cloud has been attacked, the secret may meet a risk of leakage. A solution to solve the problem is that the generated shares are distributed storage in multiple clouds. Each cloud is independent and all clouds can have a collaboration to manage the secret image. To address this issue, a novel hierarchical secret image sharing scheme with multi-group joint management is proposed in this paper, which is suitable for protecting the security of the secret image by distributed storage over multiple clouds. In the proposed scheme, the secret image would be shared among multiple groups with different thresholds. The number of each group’s shareholders is determined by a sequence of thresholds. Therefore, the proposed scheme is a hierarchical secret image sharing scheme in which the secret image can be reconstructed if and only if the number of shares has met all threshold conditions. In addition, the generated shares have the same weight, which is more suitable for universal applicability. Both the system analysis and the simulation results prove that the proposed scheme is efficient and practical.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Lin, Changlu, Huidan Hu, Chin-Chen Chang, and Shaohua Tang. "A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction." IEEE Access 6 (2018): 70666–73. http://dx.doi.org/10.1109/access.2018.2880975.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

ZOU, Hui, and Jian-dong WANG. "Multi-level threshold multi-secret sharing scheme with proactive security." Journal of Computer Applications 29, no. 8 (October 9, 2009): 2218–19. http://dx.doi.org/10.3724/sp.j.1087.2009.02218.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

MAN, ZHONG-XIAO, YUN-JIE XIA, and ZHAN-JUN ZHANG. "MANY-AGENT CONTROLLED MULTI-PLAYER QUANTUM SECRET SHARING SCHEME." International Journal of Modern Physics C 18, no. 02 (February 2007): 177–85. http://dx.doi.org/10.1142/s0129183107010528.

Повний текст джерела
Анотація:
In this paper, we propose a scheme of many-agent controlled multi-player quantum secret sharing. The players are some filed performers to implement a task by using the secret messages from a supremo, while the agents may be the players' superiors who hold the controls also from the supremo and can manipulate the task by using the controls. In the scheme only Bell states are employed and need to be identified, which implies that it is more easily implemented with today's technique.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

XIAO, Liangliang. "Linear multi-secret sharing schemes." Science in China Series F 48, no. 1 (2005): 125. http://dx.doi.org/10.1360/03yf0599.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Lin, Cheng-Shian, Chien-Chang Chen, and Yu-Cheng Chen. "XOR-Based Progressively Secret Image Sharing." Mathematics 9, no. 6 (March 12, 2021): 612. http://dx.doi.org/10.3390/math9060612.

Повний текст джерела
Анотація:
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily. However, how to recover secret images with progressive steps is not addressed. In this study, we proposed an XOR-based (m, t, Ti) multi-secret image sharing scheme that shares m secret images among m participants and recovers m shared images progressively with t thresholds. The proposed secret images partition strategy (SIPS) partitions m secret images to generate intermediate images for different thresholds in the sharing procedure. Based on progressive recovery property, the proposed recovery method recovers parts of the secret images by gathering consecutive shared images. Moreover, gathering all shared images can perfectly recover all secret images. The experimental results show that the proposed XOR-based multi-secret image sharing method has high security and efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Ha, Yan Yan, Shuai Ji, Wen Cai He, and Yao Zhang. "Multi-Secret Sharing Visual Cryptography Scheme Based on XOR Algorithm." Applied Mechanics and Materials 644-650 (September 2014): 2108–11. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2108.

Повний текст джерела
Анотація:
XOR algorithm can be used to improve the recovery effects of visual cryptography scheme. In this paper, we present a multi-secret visual cryptography scheme by using the matrices of the (k, k)-VCS. We can reveal multiple secret images perfectly by the XOR algorithm and shifting operation on the shares. The visual qualities of recovered images are ideal without any pixel expansion.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Fu, Zheng Xin, and Bin Yu. "A Modified Multi-Secret Visual Cryptography with Ring Shares." Advanced Engineering Forum 6-7 (September 2012): 343–49. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.343.

Повний текст джерела
Анотація:
A visual cryptography scheme encoding multiple secret images into two ring shares is proposed in this paper. In the secret sharing process, two shares are produced by the marked areas and the basis matrices of (2, 2)-VCS. Using ring shift right function, the secret images are recovered by stacking two shares. The security and contrast properties of the scheme have been proved. Compared with the previous ones, the scheme makes the number of secret images unlimited. Furthermore, the pixel expansion and the relative difference are improved greatly.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Yang, Yu Guang, and Hai Ping Chai. "A Trusted Multi-Party Authentication Scheme Based on Proactive-ElGamal Threshold Secret Sharing System." Applied Mechanics and Materials 235 (November 2012): 20–24. http://dx.doi.org/10.4028/www.scientific.net/amm.235.20.

Повний текст джерела
Анотація:
In most existing authentication schemes users are authenticated by the server one by one which results in lower efficiency of authentication when the number of users is large. Aiming at the drawback, this paper propose an efficient trusted multi-party authentication scheme based on threshold secret sharing, the discrete logarithm problem and ElGamal cryptosystem. Using (t,n) threshold secret sharing idea, the paper propose a (t,n) threshold authentication scheme which can not only simultaneously authenticate t users satisfying some specific conditions, but also authenticate new users dynamically by distributing a new authentication key for the new user which was produced by t old users and the new user together. Finally, the security and efficiency of the proposed scheme are analyzed.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Qin, Huawang, and Raylin Tso. "High-capacity quantum secret sharing based on orbital angular momentum." Quantum Information and Computation 18, no. 7&8 (June 2018): 579–91. http://dx.doi.org/10.26421/qic18.7-8-3.

Повний текст джерела
Анотація:
A high-capacity quantum secret sharing scheme based on orbital angular momentum is proposed. The dealer uses single particles in the orbital angular momentum (OAM) basis to bring the secret and encodes the secret through performing the transformation between the orbital angular momentum (OAM) basis and the angular position (ANG) basis. In the recovery, the participants perform the single-particle measurements to reconstruct the secret. The proposed scheme can use the multi-dimension of OAM to reach higher information capacity and enhanced security.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

PANG, Liao-Jun, Qing-Qi PEI, Li-Cheng JIAO, and Yu-Min WANG. "An Identity (ID)-Based Threshold Multi-Secret Sharing Scheme." Journal of Software 19, no. 10 (October 20, 2008): 2739–45. http://dx.doi.org/10.3724/sp.j.1001.2008.02739.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Wu, Tsu-Yang, and Yuh-Min Tseng. "Publicly verifiable multi-secret sharing scheme from bilinear pairings." IET Information Security 7, no. 3 (September 1, 2013): 239–46. http://dx.doi.org/10.1049/iet-ifs.2012.0105.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Chen, Chien-Chang, and Wei-Jie Wu. "A secure Boolean-based multi-secret image sharing scheme." Journal of Systems and Software 92 (June 2014): 107–14. http://dx.doi.org/10.1016/j.jss.2014.01.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Yu, Ying, Hongliang Cai, Dan Tang, and Wei Yuan. "Multi-secret Image Sharing Scheme based on coding method." IOP Conference Series: Materials Science and Engineering 631 (November 7, 2019): 052043. http://dx.doi.org/10.1088/1757-899x/631/5/052043.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Nag, Amitava, Jyoti Prakash Singh, and Amit Kumar Singh. "An efficient Boolean based multi-secret image sharing scheme." Multimedia Tools and Applications 79, no. 23-24 (June 7, 2019): 16219–43. http://dx.doi.org/10.1007/s11042-019-07807-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Martín del Rey, A. "A multi-secret sharing scheme for 3D solid objects." Expert Systems with Applications 42, no. 4 (March 2015): 2114–20. http://dx.doi.org/10.1016/j.eswa.2014.10.035.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Hsu, Ching-Fang, Qi Cheng, Xueming Tang, and Bing Zeng. "An ideal multi-secret sharing scheme based on MSP." Information Sciences 181, no. 7 (April 1, 2011): 1403–9. http://dx.doi.org/10.1016/j.ins.2010.11.032.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Li, Bin. "Bipartite Threshold Multi-Secret Sharing Scheme Based on Hypersphere." American Journal of Computational Mathematics 09, no. 04 (2019): 207–20. http://dx.doi.org/10.4236/ajcm.2019.94016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Chen, Chien-Chang, Wei-Jie Wu, and Jun-Long Chen. "Highly efficient and secure multi-secret image sharing scheme." Multimedia Tools and Applications 75, no. 12 (May 3, 2015): 7113–28. http://dx.doi.org/10.1007/s11042-015-2634-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

N, Rukma Rekha, Rolla Subrahmanyam, and Subba Rao Y.V. "Multi Group Key Agreement Protocol Using Secret Sharing Scheme." International Journal of Security and Networks 1, no. 1 (2023): 1. http://dx.doi.org/10.1504/ijsn.2023.10056277.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії