Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

A verifiable secret sharing scheme with combiner verification and cheater identification

S Kandar, BC Dhara - Journal of Information Security and Applications, 2020 - Elsevier
In threshold secret sharing (SS) scheme, widely known as (k, n) threshold secret sharing, a
secret S is divided into n shares and distributed to participants by a dealer in such a way that …

[HTML][HTML] Centralized threshold key generation protocol based on Shamir secret sharing and HMAC authentication

SA Abdel Hakeem, HW Kim - Sensors, 2022 - mdpi.com
Many group key management protocols have been proposed to manage key generation and
distribution of vehicular communication. However, most of them suffer from high …

A verifiable multi-secret image sharing scheme using XOR operation and hash function

AK Chattopadhyay, A Nag, JP Singh… - Multimedia Tools and …, 2021 - Springer
In a secret image sharing (SIS) scheme, a dealer (the data owner or a trusted third-party)
encodes a secret image into some share images and distributes them among some …

Constructing ideal secret sharing schemes based on Chinese remainder theorem

Y Ning, F Miao, W Huang, K Meng, Y Xiong… - … Conference on the …, 2018 - Springer
Abstract Since (t, n)-threshold secret sharing (SS) was initially proposed by Shamir and
Blakley separately in 1979, it has been widely used in many aspects. Later on, Asmuth and …

Efficient (k, n)-threshold secret sharing method with cheater prevention for QR code application

PC Huang, CC Chang, YH Li - Journal of Internet Technology, 2022 - jit.ndhu.edu.tw
To protect secret message, secret sharing technique divides it into n shares and distributes
them to n involved participants. However, it is hardly to prevent a dishonest participant to …

A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets

Y Liu, L Harn, CC Chang - International Journal of …, 2015 - Wiley Online Library
Verifiable secret sharing (VSS) has been extensively used as a cryptographic tool in many
applications of information security in recent years. A VSS enables a dealer to divide a …

[PDF][PDF] Secure data outsourcing on cloud using secret sharing scheme.

AK Chattopadhyay, A Nag, K Majumder - Int. J. Netw. Secur., 2017 - academia.edu
Abstract Data Outsourcing in Cloud (DOC) has its exclusive benefits like low-cost, lower
management overhead, elasticity of storage etc and these encourage organizations to use …

[PDF][PDF] Weighted Secret Sharing Based on the Chinese Remainder Theorem.

L Harn, F Miao - Int. J. Netw. Secur., 2014 - Citeseer
In a),(nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way
that (a) the secret can be recovered successfully with t or more than t shares, and (b) the …

Secure and effective key management using secret sharing schemes in cloud computing

S Fatima, S Ahmad - International Journal of e-Collaboration (IJeC), 2020 - igi-global.com
Security is a crucial problem in Cloud computing. Storing and accessing the data in the
Cloud is very popular nowadays but the security of data is still lagging behind. Secret …