M Hayashi, T Koshiba - IEEE/ACM Transactions on Networking, 2023 - ieeexplore.ieee.org
Secret sharing is a useful method for secure distributed data storage. Such a distributed data storage can avoid the information leakage under an attack to a limited number of distributed …
A secret sharing scheme is non-perfect if some subsets of players that cannot recover the secret value have partial information about it. The information ratio of a secret sharing …
M Sasaki, Y Watanabe - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
The aim of this paper is to maximize the range of the access control of visual secret sharing (VSS) schemes encrypting multiple images. First, the formulation of access structures for a …
RA Chou, J Kliewer - IEEE Transactions on Information Theory, 2024 - ieeexplore.ieee.org
Consider the problem of storing data in a distributed manner over T servers. Specifically, the data needs to (i) be recoverable from any servers, and (ii) remain private from any z …
A Beimel, O Farràs, O Lasri, O Nir - Theory of Cryptography Conference, 2025 - Springer
In a secret-sharing scheme, a secret is shared among n parties such that the secret can be recovered by authorized coalitions, while it should be kept hidden from unauthorized …
We prove that for every n and 1< t< n 1< t< n any t-out-of-n threshold secret sharing scheme for one-bit secrets requires share size\log (t+ 1) log (t+ 1). Our bound is tight when t= n-1 t= n …
Y Chen, Y Jiang, Y Huang, FC Zheng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this paper, we investigate edge cooperation based coded caching in fog radio access networks (F-RANs). Initially, we propose a cooperative coded caching scheme which utilizes …
M Gharahi, S Khazaei - Theoretical Computer Science, 2019 - Elsevier
The efficiency of a secret sharing scheme is measured via its information ratio. The optimal information ratio (OIR) of an access structure is the infimum of the information ratios of all …