نتایج جستجو برای: multi stage secret sharing scheme

تعداد نتایج: 1080245  

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

2012
Cheng Guo Chin-Chen Chang Chuan Qin Feng Chia

Visual cryptography (VC) has been developed extensively based on its practicability. These schemes can encode a black-and-white secret image into several shadow images, and, by stacking a certain number of shadow images, can retrieve the secret image through the human visual system. In this paper, we employ Hsu et al.’s ideal multi-threshold secret sharing scheme based on monotone span programs...

Journal: :JNW 2012
Yongquan Cai Zhanhai Luo Yi Yang

In this paper we mainly focus on the fraud problem among the players and the shortcomings of multisecret sharing existed in rational secret sharing schemes. Based on the exited schemes and the related knowledge such as bit commitment agreement, we proposed a new rational multi-secret sharing scheme that has high security. In our scheme, we take an identity authentication for the dealer in distr...

Journal: :CoRR 2005
Hao Chen

It is well-known that the linear secret-sharing scheme (LSSS) can be constructed from linear error-correcting codes (Brickell [1], R.J. McEliece and D.V.Sarwate [2],Cramer, el.,[3]). The theory of linear codes from algebraic-geometric curves (algebraic-geometric (AG) codes or geometric Goppa code) has been well-developed since the work of V.Goppa and Tsfasman, Vladut, and Zink( see [17], [18] a...

Journal: :IOP Conference Series: Materials Science and Engineering 2019

2006
Justie Su-tzu Juan Yu-Lin Chuang

Secret sharing schemes are methods for distributing a secret among n participants in such a way that any qualified subsets of participants can recover the secret, and unqualified participants can not. In 1979, secret sharing schemes were first independently introduced by Blakley and Shamir. In 1987, Feldman proposed a verifiable secret sharing scheme based on Shamir’s Scheme, that every partici...

Journal: :Journal of Communications Software and Systems 2015

Journal: :I. J. Network Security 2014
Zhi-Hui Wang Haibo Jin Xuebo Wang Chin-Chen Chang

Secret image sharing, as an extension of secret sharing, has attracted the attention of many scholars in recent years. Multi-secret image sharing is an extension of traditional secret image sharing in which only one secret image can be shared among one group. In order to extend the utility of the mechanism, we propose an innovative (n, n) secret image sharing scheme based on matrix transformati...

Journal: :J. Inf. Sci. Eng. 1999
Ren-Junn Hwang Chin-Chen Chang

An efficient threshold scheme is proposed in this paper. It overcomes the weakness of Asmuth et al.’s scheme. The (r, n)-threshold scheme proposed below only takes O(r) operations to recover the shared secret while Shamir’s scheme takes O(rlogr) operations. We show that our scheme is perfect. Further, we also propose a method to generate a pairwise relatively prime integer set which satisfies t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید