8 Hits in 1.9 sec

Some Multisecret-Sharing Schemes over Finite Fields

Selda Çalkavur, Patrick Solé
2020 Mathematics  
In this work, we construct a multisecret-sharing scheme over finite fields. The reconstruction algorithm is based on Blakley's method.  ...  A secret sharing scheme is a method of assigning shares for a secret to some participants such that only some distinguished subsets of these subsets can recover the secret while other subsets cannot.  ...  However, every (r, m, n)-multisecret-sharing scheme gives r single secret (m, n)-threshold schemes [15] .  ... 
doi:10.3390/math8050654 fatcat:t7piy476mzdorh23vg66lctc5q

A Multiple Secret Sharing Scheme based on Matrix Projection

Kai Wang, Xukai Zou, Yan Sui
2009 2009 33rd Annual IEEE International Computer Software and Applications Conference  
Our scheme increases the potential range of the threshold. The increment of the threshold range is even more when we are using the proactive feature of the scheme.  ...  Besides, the proposed scheme can also take advantage of the proactive characteristic of the Matrix Projection Method to update shares periodically to improve security.  ...  This is called the proactive feature of a secret sharing scheme and it can improve the overall security of a secret sharing scheme. Another property is the verifiable feature.  ... 
doi:10.1109/compsac.2009.60 dblp:conf/compsac/WangZS09 fatcat:bgp4ronun5ejhlae6shajop3ra


H. Ateeq Ahmed .
2015 International Journal of Research in Engineering and Technology  
In this paper after taking a review of various proposed schemes, problems and attacks for MANETs and their solutions, In order to make any system secure, the security services such as authentication, confidentiality  ...  We considered the role of threshold cryptography to provide advanced security for the MANETs, revealing the authorization process using threshold digital signature, proxy signature and multi-signature  ...  threshold cryptography.  ... 
doi:10.15623/ijret.2015.0414011 fatcat:6uin7y72hfbpbei4bwpovamtjq


2020 International Journal of Engineering Technology and Management Sciences  
In this paper, a proposed scheme is narrated which will further strengthens the Mechanism of Security. Instead of using a Unique key, Discrete keys are used for Encryption & Decryption mechanisms.  ...  MANETs tends to be very prone to complex types of attacks as it is very easy for the attacker to gain control on it due to its inadequate Security mechanism.  ...  Solution to proactive multi-secret Sharing Threshold Schemes For threshold multisecret sharing two schemes are in use CA-based and ID-based as proposed by.  ... 
doi:10.46647/ijetms.2020.v04i05.008 fatcat:4vdvqs6hfzhttl6ms3zlirs3q4

A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks

Shiyue Qin, Zhenhua Tan, Fucai Zhou, Jian Xu, Zongye Zhang, Jinwei Wang
2021 Security and Communication Networks  
In this paper, we perform a complimentary of these two techniques to propose a verifiable secret image sharing scheme, where CA is used to enhance the security of the secret image, and matrix projection  ...  Therefore, our scheme further strengthens security for the images in 5G networks.  ...  [12] is a multisecret image sharing scheme. Each secret image contains a specific threshold value, and the size of shadows is dynamically relative to it.  ... 
doi:10.1155/2021/6629726 fatcat:adzykdh5gzgrrfecppefndujf4

Threshold Multi Secret Sharing Using Elliptic Curve and Pairing [article]

V P Binu, A Sreekumar
2016 arXiv   pre-print
A (t;n) threshold secret sharing scheme is one in which t or more participant can join together to retrieve the secret.Traditional single secret sharing schemes are modified and generalized to share multiple  ...  secrets.Use of elliptic curve and pairing in secret sharing is gaining more importance.In this paper we propose a threshold multi secret sharing scheme where more than one secret is shared.When the threshold  ...  of only the threshold multi secret sharing schemes based on elliptic curve and pairing.Lets consider a (t, n) threshold multi secret sharing scheme which can share m secrets.It is found that in Liu's  ... 
arXiv:1603.09524v1 fatcat:b5a6chpjknh2hgcegnd2bpdt6q

Guest Editorial Mobile Routers and Network Mobility

2006 IEEE Journal on Selected Areas in Communications  
The next paper on security, "Multiple Key Sharing and Distribution Scheme With ( ) Threshold for NEMO Group Communications" by Jiang et al. propose a novel secure key sharing and distribution scheme for  ...  The proposed multiple key sharing and distribution scheme with ( ) threshold mechanism is based on multisecret sharing and modular square root (MSR) technique, and it consists of three phases: a secret  ... 
doi:10.1109/jsac.2006.875107 fatcat:74riqaqgcrbhjn52fai5cbplri

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+70 others)
2015 International Journal of Network Security   unpublished
In this paper, we show that the scheme has a drawback that the sender can serve a single receiver only once. The drawback results from the deterministic encryption used.  ...  In 2007, Camenisch, Neven and Shelat proposed an adap-tive oblivious transfer (OT) scheme in which a sender has n messages, of which a receiver can adaptively choose to receive k one-after-the-other.  ...  [7] presented a new (t, n) threshold multisecret sharing scheme. In 2007, Zhao et al.  ...