Fair hierarchical secret sharing scheme based on smart contract

E Zhang, M Li, SM Yiu, J Du, JZ Zhu, GG Jin - Information Sciences, 2021 - Elsevier
Secret sharing has a number of practical applications in network-based scenarios, such as
key transfer protocols, attribute-based encryption and secure multiparty computation …

A verifiable secret sharing scheme with combiner verification and cheater identification

S Kandar, BC Dhara - Journal of Information Security and Applications, 2020 - Elsevier
In threshold secret sharing (SS) scheme, widely known as (k, n) threshold secret sharing, a
secret S is divided into n shares and distributed to participants by a dealer in such a way that …

An efficient verifiable threshold multi-secret sharing scheme with different stages

D Chen, W Lu, W Xing, N Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Secret sharing is one of the most important cryptographic primitives used for data
outsourcing. The threshold-based secret sharing scheme is one of the well-known secret …

Source-location privacy full protection in wireless sensor networks

N Wang, J Fu, J Zeng, BK Bhargava - Information Sciences, 2018 - Elsevier
In many scenarios, the locations of monitored targets need to be reported by source nodes,
but should remain anonymous in wireless sensor networks. Source-location privacy …

Secure and efficient smart healthcare system based on federated learning

W Liu, Y Zhang, G Han, J Cao, H Cui… - International Journal of …, 2023 - Wiley Online Library
The rapid development of smart healthcare system in the Internet of Things (IoT) has made
the early detection of many chronic diseases more convenient, quick, and economical …

Threshold-based post-quantum secure verifiable multi-secret sharing for distributed storage blockchain

S Mesnager, A Sınak, O Yayla - Mathematics, 2020 - mdpi.com
Blockchain systems store transaction data in the form of a distributed ledger where each
node stores a copy of all data, which gives rise to storage issues. It is well-known that the …

An analytical appraisal on recent trends and challenges in secret sharing schemes

N Francis, T Monoth - Proceedings of the International Conference on …, 2023 - Springer
Secret sharing is one of the most widely studied research areas in cryptography and is
developed as a method to safeguard cryptographic keys. Modern technology has substituted …

Realizing secret sharing with general access structure

L Harn, C Hsu, M Zhang, T He, M Zhang - Information Sciences, 2016 - Elsevier
Secret sharing (SS) is one of the most important cryptographic primitives used for data
outsourcing. The (t, n) SS was introduced by Shamir and Blakley separately in 1979. The …

Lightweight authentication scheme for massive MIMO on Internet of Things connectivity

A Dwivedi, R Agarwal, PK Shukla - Physical Communication, 2023 - Elsevier
Massive MIMO is an essential technology in developing 5G networks and a concept that
may be applied to other wireless systems. However, the advantages of adopting massive …

Security of separated data in cloud systems with competing attack detection and data theft processes

G Levitin, L Xing, HZ Huang - Risk analysis, 2019 - Wiley Online Library
Empowered by virtualization technology, service requests from cloud users can be honored
through creating and running virtual machines. Virtual machines established for different …