A survey on perfectly secure verifiable secret-sharing

A Chandramouli, A Choudhury, A Patra - ACM Computing Surveys …, 2022 - dl.acm.org
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It
is used as a building block in several distributed computing tasks, such as Byzantine …

Privacy preservation models for third-party auditor over cloud computing: A survey

A Razaque, MBH Frej, B Alotaibi, M Alotaibi - Electronics, 2021 - mdpi.com
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …

Steganography and authentication in image sharing without parity bits

CN Yang, JF Ouyang, L Harn - Optics Communications, 2012 - Elsevier
Recently, a polynomial-based (k, n) steganography and authenticated image sharing (SAIS)
scheme was proposed to share a secret image into n stego-images. At the same time, one …

Computational verifiable secret sharing revisited

M Backes, A Kate, A Patra - … 2011: 17th International Conference on the …, 2011 - Springer
Verifiable secret sharing (VSS) is an important primitive in distributed cryptography that
allows a dealer to share a secret among n parties in the presence of an adversary …

An efficient framework for unconditionally secure multiparty computation

A Choudhury, A Patra - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
parties to securely compute an agreed function f over some finite field in the presence of a
computationally unbounded adversary, who can maliciously corrupt any t out of the n …

Multiparty delegated quantum computing

E Kashefi, A Pappa - Cryptography, 2017 - mdpi.com
Quantum computing has seen tremendous progress in the past few years. However, due to
limitations in the scalability of quantum technologies, it seems that we are far from …

Perfect (parallel) broadcast in constant expected rounds via statistical VSS

G Asharov, A Chandramouli - … International Conference on the Theory and …, 2024 - Springer
We study broadcast protocols in the information-theoretic model under optimal conditions,
where the number of corruptions t is at most one-third of the parties, n. While worst-case Ω …

Protecting data privacy and security for cloud computing based on secret sharing

CN Yang, JB Lai - 2013 International Symposium on Biometrics …, 2013 - ieeexplore.ieee.org
Cloud computing is an Internet-based computing. Computing services, such as data,
storage, software, computing, and application, are delivered to local devices through …

Lightweight noninteractive membership authentication and group key establishment for WSNs

Q Cheng, C Hsu, L Harn - Mathematical Problems in …, 2020 - Wiley Online Library
Wireless sensor networks (WSNs) exhibit their potential capacity in the next generation of
mobile communication networks and wireless systems (5G). Collected data in WSNs are …

Dynamic threshold secret reconstruction and its application to the threshold cryptography

L Harn, CF Hsu - Information Processing Letters, 2015 - Elsevier
Abstract Shamir's (t, n) secret sharing scheme (SS) is based on a univariate polynomial and
is the most cited SS in the literature. The secret in a (t, n) SS can be recovered either by …