A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Visual Secret Sharing Scheme Based on QR Codes

Inthispaper,anovelvisualsecretsharing(VSS)schemeusingQRcodesisinvestigated.Theproposed visualsecretsharingschemebasedonQRcodes(VSSQR)canvisuallyrevealsecretimagebystacking sufficient(shadowimages)sharesaswellasscantheQRcodebyaQRcodereader.OurVSSQR exploitstheerrorcorrectionmechanismintheQRcodestructure,toembedthebitscorresponding ...

متن کامل

A Novel User Authentication Scheme Based on QR-Code

User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel. Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access....

متن کامل

A Secret Sharing Scheme from a Chain Ring Linear Code

After the seminal papers [3] and [11] the secret sharing problem has received the attention of numerous researchers for several reasons such as real-world applications as well as theoretical relations with several areas including Coding Theory. In this note an access structure of a secret sharing scheme associated to a linear code which is the Gray image of a two-weight linear code over a finit...

متن کامل

3CAuth - A Novel Multi-Factor Authentication Scheme Using QR-Code

A multi factor authentication scheme called ’3C-Auth’ is proposed in this paper. The scheme carries out a comprehensive authentication process using the smart card, secret-pin, registered finger print, and registered mobile number of the user. The user’s password is neither transmitted in plaintext form nor revealed to the authentication server. The scheme is shone to be proof against phishing,...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2019

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2019/7937816