[PDF][PDF] Privileged authenticity in reconstruction of digital encrypted shares

J Dey, A Bhowmik, A Sarkar, S Karforma - IAES Int J Artif Intell (IJ-AI), 2019 - academia.edu
Efficient message reconstruction mechanism depends on the entire partial shares received
in random manner. This paper proposed a technique to ensure the authenticated …

[PDF][PDF] Shared cryptographic scheme with efficient data recovery and compression for audio secret sharing

SA Yeshwantrao, VJ Jadhav, PS Rahate - International Journal of …, 2014 - Citeseer
Present scenario suggests many audio files are needed to be transmitted over internet for
various important purposes. Earlier cryptographic schemes for secret sharing lead to high …

A new efficient and secure secret reconstruction scheme (SSRS) with verifiable shares based on a symmetric bivariate polynomial

C Hsu, L Harn, S Wu, L Ke - Mobile Information Systems, 2020 - Wiley Online Library
Secret sharing (SS) schemes have been widely used in secure computer communications
systems. Recently, a new type of SS scheme, called the secure secret reconstruction …

A novel approach for verifiable (n, n) audio secret sharing scheme

SS Bharti, M Gupta, S Agarwal - Multimedia Tools and Applications, 2018 - Springer
Audio is a natural way of communication among persons. Nowadays, many cases of Phone-
tapping, hacking of E-mail having some audio files have been reported. Hence, for sending …

G_ {its}^ 2 VSR: An Information Theoretical Secure Verifiable Secret Redistribution Protocol for Long-term Archival Storage

VH Gupta, K Gopinath - Fourth international IEEE security in …, 2007 - ieeexplore.ieee.org
Protocols for secure archival storage are becoming increasingly important as the use of
digital storage for sensitive documents is gaining wider practice. In [8], Wong et al. combined …

Authenticated encryption schemes with message linkage

H Shin-Jia, C Chin-Chen, Y Wei-Pang - Information Processing Letters, 1996 - elibrary.ru
Authenticated encryption schemes need redundancy schemes to link up the message
blocks; however, these redundancies increase communication costs. To construct links …

Authenticated encryption schemes with message linkage

SJ Hwang, CC Chang, WP Yang - Information processing letters, 1996 - Elsevier
Authenticated encryption schemes need redundancy schemes to link up the message
blocks; however, these redundancies increase communication costs. To construct links …

[PDF][PDF] Shared cryptography with embedded session key for secret audio

PK Naskar, HN Khan, U Roy, A Chaudhuri… - International Journal of …, 2011 - academia.edu
In today's scenario many audio/voice files are needed to be transmitted over internet for
various important purposes. So protection of these files is an important issue. Efficient …

Cheating identifiable polynomial based secret sharing scheme for audio and image

G Prashanti, MN Bhat - Multimedia Tools and Applications, 2024 - Springer
Polynomial based secret sharing is the art of protecting information and a tool used in areas
where a secret has to be distributed among multiple parties. In this method, secret is …

A hybrid-based verifiable secret sharing scheme using Chinese remainder theorem

OP Verma, N Jain, SK Pal - Arabian Journal for Science and Engineering, 2020 - Springer
It is not always in the best interests to rely on an individual to have control of entire sensitive
information. This has led to the need for secret sharing schemes, which divide secret (key) …