(t, k, n) Regional Secret Image Sharing over Finite Fields

MK Sardar, J Pramanik, A Adhikari - Signal Processing, 2023 - Elsevier
Secret image sharing (SIS), a tool capable of distributing a private image among certain
number of shareholders, ensures both authorized recovery and unauthorized forbidding of …

Simple approach to realizing verifiable secret sharing for secure cloud system

K Iwamura, AAAM Kamal - IEEE Access, 2022 - ieeexplore.ieee.org
In threshold secret sharing, a secret is converted into shares such that any threshold or more
shares allow for the reconstruction of this secret; however, the total storage cost increases …

Evolving secret sharing in almost semi-honest model

J Pramanik, A Adhikari - International Conference on Security and Privacy, 2021 - Springer
Evolving secret sharing is a special kind of secret sharing where the number of shareholders
is not known beforehand, ie, at time t= 0 t= 0. In classical secret sharing such a restriction …

Efficient random grid visual cryptographic schemes having essential members

B Chandra Das, MK Sardar, A Adhikari - Security and Privacy: Select …, 2021 - Springer
This paper deals with both “OR”-and “XOR”-based black and white random grid visual
cryptographic schemes (RGVCS) for (t, k, n) essential access structure. The (t, k, n) essential …