Search
Search Results
-
A Lattice-Based Single-Share Secret Sharing Scheme
In general, in a secret sharing scheme, the dealer chooses shares and distributes them to the participants securely. For the secure communication,...
-
Natural share-based lightweight (n, n) single secret image sharing scheme using LSB stuffing for medical images
Natural share-based secret image sharing (SIS) scheme is an important security mechanism used to secure medical images such as X-rays, MRIs, and CT...
-
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process....
-
Changeable essential threshold secret image sharing scheme with verifiability using bloom filter
In threshold secret image sharing schemes (k, n), the secret image S is distributed among n shareholders. To recover the secret image, at least k...
-
A verifiable multi-secret image sharing scheme based on DNA encryption
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes...
-
A GPU scheme for multi-secret visual sharing with varied secret dimensions and contrast enhancement using blind super-resolution
Multi-secret visual sharing schemes are essential for secure and efficient sharing of sensitive visual information. However, existing schemes often...
-
Cheating identifiable polynomial based secret sharing scheme for audio and image
Polynomial based secret sharing is the art of protecting information and a tool used in areas where a secret has to be distributed among multiple...
-
A novel multi secret image sharing scheme for different dimension secrets
The existing state of the art schemes deals with the same dimension secret images but less work is available in the literature for different...
-
Enhanced block based progressive visual secret sharing scheme for grayscale and color image
Block by block, the secret image will be retrieved from user-friendly and noise-like shares in the Block Based Progressive Secret Sharing (BPVSS)...
-
Compressed sensing based visually secure multi-secret image encryption-sharing scheme
The existing encryption schemes of visually secure image have drawbacks, such as excessive concentration of image data and insufficient resistance to...
-
A fully dynamic multi-secret sharing scheme with redundant authorization
Based on Shamir’s threshold scheme and Elliptic curve cryptography, a fully dynamic multi-secret sharing scheme with redundant authorization is...
-
Progressive secret image sharing based on Boolean operations and polynomial interpolations
With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy...
-
Improved resilience of secret sharing scheme with augmented multifarious features
The requirement of greater flexibility and additional functionality in conventional secret sharing schemes is posed in many practical applications....
-
Unconditionally secure non-malleable secret sharing and circular external difference families
Various notions of non-malleable secret sharing schemes have been considered. In this paper, we review the existing work on non-malleable secret...
-
Novel key-integration to safeguard counting-based secret-sharing from possibilities of cyberattack breaches
In the face of malicious cyberattacks, classic security approaches like cryptography and steganography are becoming not sufficient. Secrecy are...
-
A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions
Secret sharing schemes play a vital role in securely distributing a secret among multiple participants, ensuring confidentiality and access control....
-
New attacks on secret sharing-based data outsourcing: toward a resistant scheme
In this paper, two new practical attacks on some secret sharing-based data outsourcing schemes are first introduced, and several other security and...
-
A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
In a ( t , n ) secret sharing scheme, cheating identification provides a very effective way to protect the security of the secret. In this paper, we...
-
Accelerating randomized image secret sharing with GPU: contrast enhancement and secure reconstruction using progressive and convolutional approaches
Image Secret Sharing (ISS) is a cryptographic technique used to distribute secret images among multiple users. However, current Visual Secret Sharing...
-
FPGA acceleration of secret sharing for 3D data cubes
Secret sharing can protect the security of important secret information in the network environment. However, the computational complexity and...