A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Some Multisecret-Sharing Schemes over Finite Fields
2020
Mathematics
In this work, we construct a multisecret-sharing scheme over finite fields. The reconstruction algorithm is based on Blakley's method. ...
A secret sharing scheme is a method of assigning shares for a secret to some participants such that only some distinguished subsets of these subsets can recover the secret while other subsets cannot. ...
However, every (r, m, n)-multisecret-sharing scheme gives r single secret (m, n)-threshold schemes [15] . ...
doi:10.3390/math8050654
fatcat:t7piy476mzdorh23vg66lctc5q
A Multiple Secret Sharing Scheme based on Matrix Projection
2009
2009 33rd Annual IEEE International Computer Software and Applications Conference
Our scheme increases the potential range of the threshold. The increment of the threshold range is even more when we are using the proactive feature of the scheme. ...
Besides, the proposed scheme can also take advantage of the proactive characteristic of the Matrix Projection Method to update shares periodically to improve security. ...
This is called the proactive feature of a secret sharing scheme and it can improve the overall security of a secret sharing scheme. Another property is the verifiable feature. ...
doi:10.1109/compsac.2009.60
dblp:conf/compsac/WangZS09
fatcat:bgp4ronun5ejhlae6shajop3ra
ADVANCED SECURITY FOR MANETS USING THRESHOLD CRYPTOGRAPHY
2015
International Journal of Research in Engineering and Technology
In this paper after taking a review of various proposed schemes, problems and attacks for MANETs and their solutions, In order to make any system secure, the security services such as authentication, confidentiality ...
We considered the role of threshold cryptography to provide advanced security for the MANETs, revealing the authorization process using threshold digital signature, proxy signature and multi-signature ...
threshold cryptography. ...
doi:10.15623/ijret.2015.0414011
fatcat:6uin7y72hfbpbei4bwpovamtjq
ENHANCHING SECURITY FOR MANETs USING DISCRETE KEY GENERATIONS
2020
International Journal of Engineering Technology and Management Sciences
In this paper, a proposed scheme is narrated which will further strengthens the Mechanism of Security. Instead of using a Unique key, Discrete keys are used for Encryption & Decryption mechanisms. ...
MANETs tends to be very prone to complex types of attacks as it is very easy for the attacker to gain control on it due to its inadequate Security mechanism. ...
Solution to proactive multi-secret Sharing Threshold Schemes For threshold multisecret sharing two schemes are in use CA-based and ID-based as proposed by. ...
doi:10.46647/ijetms.2020.v04i05.008
fatcat:4vdvqs6hfzhttl6ms3zlirs3q4
A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks
2021
Security and Communication Networks
In this paper, we perform a complimentary of these two techniques to propose a verifiable secret image sharing scheme, where CA is used to enhance the security of the secret image, and matrix projection ...
Therefore, our scheme further strengthens security for the images in 5G networks. ...
[12] is a multisecret image sharing scheme. Each secret image contains a specific threshold value, and the size of shadows is dynamically relative to it. ...
doi:10.1155/2021/6629726
fatcat:adzykdh5gzgrrfecppefndujf4
Threshold Multi Secret Sharing Using Elliptic Curve and Pairing
[article]
2016
arXiv
pre-print
A (t;n) threshold secret sharing scheme is one in which t or more participant can join together to retrieve the secret.Traditional single secret sharing schemes are modified and generalized to share multiple ...
secrets.Use of elliptic curve and pairing in secret sharing is gaining more importance.In this paper we propose a threshold multi secret sharing scheme where more than one secret is shared.When the threshold ...
of only the threshold multi secret sharing schemes based on elliptic curve and pairing.Lets consider a (t, n) threshold multi secret sharing scheme which can share m secrets.It is found that in Liu's ...
arXiv:1603.09524v1
fatcat:b5a6chpjknh2hgcegnd2bpdt6q
Guest Editorial Mobile Routers and Network Mobility
2006
IEEE Journal on Selected Areas in Communications
The next paper on security, "Multiple Key Sharing and Distribution Scheme With ( ) Threshold for NEMO Group Communications" by Jiang et al. propose a novel secure key sharing and distribution scheme for ...
The proposed multiple key sharing and distribution scheme with ( ) threshold mechanism is based on multisecret sharing and modular square root (MSR) technique, and it consists of three phases: a secret ...
doi:10.1109/jsac.2006.875107
fatcat:74riqaqgcrbhjn52fai5cbplri
Online) International Journal of Network Security is published both in traditional paper form
2015
International Journal of Network Security
unpublished
In this paper, we show that the scheme has a drawback that the sender can serve a single receiver only once. The drawback results from the deterministic encryption used. ...
In 2007, Camenisch, Neven and Shelat proposed an adap-tive oblivious transfer (OT) scheme in which a sender has n messages, of which a receiver can adaptively choose to receive k one-after-the-other. ...
[7] presented a new (t, n) threshold multisecret sharing scheme. In 2007, Zhao et al. ...
fatcat:tup6p3z7pzc4dpeyn3blmj3foi