Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

LaF: Lattice-based and communication-efficient federated learning

P Xu, M Hu, T Chen, W Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Federated learning is an emerging technology which allows a server to train a global model
with the cooperation of participants without exposing the participants' data. In recent years …

Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing

J Li, X Wang, Z Huang, L Wang, Y Xiang - Journal of Parallel and …, 2019 - Elsevier
The cryptosystem-based data privacy preserving methods employ high computing power of
cloud servers, where the main feature is to allow resource sharing and provide multi-user …

An efficient lattice based multi-stage secret sharing scheme

H Pilaram, T Eghlidos - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
In this paper, we construct a lattice based (t, n) threshold multi-stage secret sharing (MSSS)
scheme according to Ajtai's construction for one-way functions. In an MSSS scheme, the …

A verifiable secret sharing scheme with combiner verification and cheater identification

S Kandar, BC Dhara - Journal of Information Security and Applications, 2020 - Elsevier
In threshold secret sharing (SS) scheme, widely known as (k, n) threshold secret sharing, a
secret S is divided into n shares and distributed to participants by a dealer in such a way that …

Secret sharing for cloud data security: a survey

V Attasena, J Darmont, N Harbi - The VLDB Journal, 2017 - Springer
Cloud computing helps reduce costs, increase business agility and deploy solutions with a
high return on investment for many types of applications. However, data security is of …

A verifiable multi-secret image sharing scheme using XOR operation and hash function

AK Chattopadhyay, A Nag, JP Singh… - Multimedia Tools and …, 2021 - Springer
In a secret image sharing (SIS) scheme, a dealer (the data owner or a trusted third-party)
encodes a secret image into some share images and distributes them among some …

Efficient verifiable multi-secret sharing scheme based on hash function

J Shao - Information Sciences, 2014 - Elsevier
A verifiable (k, t, n) multi-secret sharing scheme (VMSS) allows a dealer to share k secrets
among n players. In particular,(1) the secret shadow given by the dealer or some player can …

An efficient Boolean based multi-secret image sharing scheme

A Nag, JP Singh, AK Singh - Multimedia tools and applications, 2020 - Springer
The purpose of this paper is to develop an algorithm for sharing k secret images to n
participants in such a way that each participant gets a single share image by encoding all k …

An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares

AK Chattopadhyay, A Nag, JP Singh - Multimedia Tools and Applications, 2022 - Springer
A secret sharing scheme partitions a secret into a set of shares and distributes them among
the eligible participants, with each participant receiving one share of the secret. The sharing …