A perfect secret sharing scheme for general access structures

X Jia, Y Guo, X Luo, D Wang, C Zhang - Information Sciences, 2022 - Elsevier
The secret sharing (SS) scheme has been widely used as the de facto paradigm for group
key management in cryptography and distributed computation. An SS scheme for a general …

Realizing secret sharing with general access structure

L Harn, C Hsu, M Zhang, T He, M Zhang - Information Sciences, 2016 - Elsevier
Secret sharing (SS) is one of the most important cryptographic primitives used for data
outsourcing. The (t, n) SS was introduced by Shamir and Blakley separately in 1979. The …

[图书][B] Information-theoretic Cryptography

H Tyagi, S Watanabe - 2023 - books.google.com
This book offers a mathematical foundation for modern cryptography. It is primarily intended
as an introduction for graduate students. Readers should have basic knowledge of …

Size invariant visual cryptography schemes with evolving threshold access structures

X Wu, X Feng - IEEE Transactions on Multimedia, 2023 - ieeexplore.ieee.org
In this research, we consider the evolving threshold access structure, denoted as, for size
invariant visual cryptography scheme (SIVCS). The so-called threshold indicates the number …

Towards cheat-preventing in block-based progressive visual cryptography for general access structures

X Wu, X Zhang - Information Sciences, 2022 - Elsevier
Existing block-based progressive visual cryptography schemes (BPVCS) that prevent
cheating are limited to (2, n) and (k, n) thresholds. They are unsuitable for implementing …

Application of homomorphism to secure image sharing

N Islam, W Puech, K Hayat, R Brouzet - Optics Communications, 2011 - Elsevier
In this paper, we present a new approach for sharing images between l players by exploiting
the additive and multiplicative homomorphic properties of two well-known public key …

Secret information management apparatus, information processing apparatus, and secret information management system

N Matsuda, M Hattori, T Yoneda - US Patent 8,424,054, 2013 - Google Patents
Secret key backup is safely implemented even if a role base access structure in which the
access structure is specified using roles is used. An all combination generating unit 107 …

Optimal assignment schemes for general access structures based on linear programming

Q Li, XX Li, XJ Lai, KF Chen - Designs, Codes and Cryptography, 2015 - Springer
The paper proposes a type of secret sharing schemes called ramp assignment schemes
(RAS's) to realize general access structures (AS's). In such a scheme, each participant is …

Strong security of linear ramp secret sharing schemes with general access structures

R Eriguchi, N Kunihiro - Information Processing Letters, 2020 - Elsevier
A secret sharing scheme is a cryptographic technique to protect a secret from loss and
leakage by dividing it into shares. A ramp secret sharing scheme can improve efficiency in …

Coding theoretic construction of quantum ramp secret sharing

R Matsumoto - IEICE TRANSACTIONS on Fundamentals of …, 2018 - search.ieice.org
We show a construction of a quantum ramp secret sharing scheme from a nested pair of
linear codes. Necessary and sufficient conditions for qualified sets and forbidden sets are …