نتایج جستجو برای: multi stage secret sharing scheme

تعداد نتایج: 1080245  

Journal: :Pattern Recognition Letters 2012
Cheng Guo Chin-Chen Chang Chuan Qin

0167-8655/$ see front matter 2012 Published by http://dx.doi.org/10.1016/j.patrec.2012.04.010 ⇑ Corresponding author. Address: Department of Computer Science, Feng Chia University, No. 100 We 40724, Taiwan. Tel.: +886 4 24517250x3790; fax: +8 E-mail addresses: [email protected] (C. Guo Chang). In this paper, we consider the problem of secret image sharing in groups with multi-threshold access s...

Journal: :I. J. Network Security 2017
Li Liu Anhong Wang Chin-Chen Chang Zhihong Li

A secret image sharing with deep-steganography and twostage authentication based on matrix encoding is proposed. This scheme firstly employed Wang and Su’s sharing scheme to share a secret image into n shadows. Then, n shadows were embedded into the pre-selected cover images by using matrix encoding so as to generate n stego images. Different from the common schemes which directly use LSBs repl...

Journal: :IACR Cryptology ePrint Archive 2004
Chunming Tang Dingyi Pei Zhuojun Liu Yong He

A publicly verifiable secret sharing scheme is more applicable than a verifiable secret sharing because of the property that the validity of the shares distributed by the dealer can be verified by any party. In this paper, we construct a non-interactive and informationtheoretic publicly verifiable secret sharing by a computationally binding and unconditionally hiding commitment scheme and zero-...

Journal: :CoRR 2006
Hao Chen

For a secret sharing scheme, two parameters dmin and dcheat are defined in [12] and [13]. These two parameters measure the errorcorrecting capability and the secret-recovering capability of the secret sharing scheme against cheaters. Some general properties of the parameters have been studied in [12],[9] and [13]. The MDS secretsharing scheme was defined in [13] and it was proved that MDS perfe...

2011
R. Varalakshmi

In this paper, we will study the question of performing arbitrary updates in secret sharing schemes when shares of unaffected parties shall remain unchanged. We will introduce a zonal transformation matrix in the lifetime of secret sharing schemes to simplify constructions of multitime secret sharing schemes and propose management models that allow unlimited updates from arbitrary schemes witho...

Journal: :Inf. Sci. 2008
Massoud Hadian Dehkordi Samaneh Mashhadi

In 2006, Zhao et al. proposed a practical verifiable multi-secret sharing based on Yang et al.’s and Feldman’s schemes. In this paper we propose two efficient, computationally secure ðt; nÞ, and verifiable multi-secret sharing schemes based on homogeneous linear recursion. The first scheme has the advantage of better performance, a new simple construction and various techniques for the reconstr...

Journal: :IEEE Trans. Computers 2016
Zhen Wang Mark G. Karpovsky Lake Bu

Shamir’s secret sharing scheme is an effective way to distribute secret to a group of shareholders. The security of the unprotected sharing scheme, however, can be easily broken by cheaters or attackers who maliciously feed incorrect shares during the secret recovery stage or inject faults into hardware computing the secret. In this paper, we propose cheater detection and identification schemes...

Journal: :Chinese Journal of Electronics 2023

With the possible birth of quantum computer, traditional secret sharing schemes have been unable to meet security requirements. We proposed a new verifiable multi-secret scheme based on short integer solution problem. By utilizing symmetric binary polynomial, $k$ secrets and shares can be genera...

2009
Marek R. Ogiela Urszula Ogiela

In this paper a new way of secret sharing algorithms expansion based on additional, linguistic stage, introduced for the generation of the secret shadow elements are presented. Such a part shall be generated in the form of a linguistic description of the shared data, built by defined sequential grammar. The introduction of linguistic formalism in this scheme will provide additional information ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید