S Kandar, BC Dhara - Journal of Information Security and Applications, 2020 - Elsevier
In threshold secret sharing (SS) scheme, widely known as (k, n) threshold secret sharing, a secret S is divided into n shares and distributed to participants by a dealer in such a way that …
Many group key management protocols have been proposed to manage key generation and distribution of vehicular communication. However, most of them suffer from high …
In a secret image sharing (SIS) scheme, a dealer (the data owner or a trusted third-party) encodes a secret image into some share images and distributes them among some …
Y Ning, F Miao, W Huang, K Meng, Y Xiong… - … Conference on the …, 2018 - Springer
Abstract Since (t, n)-threshold secret sharing (SS) was initially proposed by Shamir and Blakley separately in 1979, it has been widely used in many aspects. Later on, Asmuth and …
PC Huang, CC Chang, YH Li - Journal of Internet Technology, 2022 - jit.ndhu.edu.tw
To protect secret message, secret sharing technique divides it into n shares and distributes them to n involved participants. However, it is hardly to prevent a dishonest participant to …
Y Liu, L Harn, CC Chang - International Journal of …, 2015 - Wiley Online Library
Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many applications of information security in recent years. A VSS enables a dealer to divide a …
Abstract Data Outsourcing in Cloud (DOC) has its exclusive benefits like low-cost, lower management overhead, elasticity of storage etc and these encourage organizations to use …
L Harn, F Miao - Int. J. Netw. Secur., 2014 - Citeseer
In a),(nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (a) the secret can be recovered successfully with t or more than t shares, and (b) the …
S Fatima, S Ahmad - International Journal of e-Collaboration (IJeC), 2020 - igi-global.com
Security is a crucial problem in Cloud computing. Storing and accessing the data in the Cloud is very popular nowadays but the security of data is still lagging behind. Secret …