Secure key agreement and key protection for mobile device user authentication

L Wu, J Wang, KKR Choo, D He - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As mobile devices ownership becomes more prevalent (eg, a user owns multiple mobile
devices), the capability to offer secure and user friendly authentication becomes increasingly …

Emotion recognition using secure edge and cloud computing

MS Hossain, G Muhammad - Information Sciences, 2019 - Elsevier
This paper proposes an edge-cloud based privacy-preserved automatic emotion recognition
system in which Internet of Things (IoT) devices capture facial image and speech signals …

A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem

X Jia, D Wang, D Nie, X Luo, JZ Sun - Information sciences, 2019 - Elsevier
A general (t, n) secret sharing (SS) scheme with fixed threshold allows a secret to be shared
without considering the time dynamic nature of the security environment. In this paper, we …

Security enhancement of shares generation process for multimedia counting-based secret-sharing technique

M Al-Ghamdi, M Al-Ghamdi, A Gutub - Multimedia Tools and Applications, 2019 - Springer
Secret sharing is a cryptographic tool to ensure reliable and secure access to information.
Counting-based secret sharing is a new secret sharing technique that generate the …

Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography

D He, Y Zhang, D Wang… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Mobile device and application (app) security are increasingly important, partly due to the
constant and fast-paced cyberthreat evolution. To ensure the security of communication (eg …

Source-location privacy protection based on anonymity cloud in wireless sensor networks

N Wang, J Fu, J Li, BK Bhargava - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
An adversary can deploy parasitic sensor nodes into wireless sensor networks to collect
radio traffic distributions and trace back messages to their source nodes. Then, he can …

A novel approach for multilevel multi-secret image sharing scheme

K Bisht, M Deshmukh - The Journal of Supercomputing, 2021 - Springer
Multi-secret sharing (MSS) is an effective technique that securely encodes multiple secrets
to generate shares and distributes them among the participants in such a way that these …

A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm

Y Zhang, D He, M Zhang, KKR Choo - Frontiers of Computer Science, 2020 - Springer
Mobile devices are widely used for data access, communications and storage. However,
storing a private key for signature and other cryptographic usage on a single mobile device …

A perfect secret sharing scheme for general access structures

X Jia, Y Guo, X Luo, D Wang, C Zhang - Information Sciences, 2022 - Elsevier
The secret sharing (SS) scheme has been widely used as the de facto paradigm for group
key management in cryptography and distributed computation. An SS scheme for a general …

Multi-stage multi-secret sharing scheme for hierarchical access structure

A Basit, NC Kumar, VC Venkaiah… - 2017 International …, 2017 - ieeexplore.ieee.org
Hierarchical threshold secret sharing (HTSS) schemes can be thought as a generalization of
classical threshold secret sharing schemes, and they have been extensively in the literature …