A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification

AV Soreng, S Kandar - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Image transmission is gaining importance with the advancement of information
communication technology. Transmission of sensitive images in diverse applications like …

Source-location privacy protection based on anonymity cloud in wireless sensor networks

N Wang, J Fu, J Li, BK Bhargava - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
An adversary can deploy parasitic sensor nodes into wireless sensor networks to collect
radio traffic distributions and trace back messages to their source nodes. Then, he can …

A verifiable secret sharing scheme with combiner verification and cheater identification

S Kandar, BC Dhara - Journal of Information Security and Applications, 2020 - Elsevier
In threshold secret sharing (SS) scheme, widely known as (k, n) threshold secret sharing, a
secret S is divided into n shares and distributed to participants by a dealer in such a way that …

General secret sharing based on quantum Fourier transform

S Mashhadi - Quantum Information Processing, 2019 - Springer
In this paper, we based on the quantum Fourier transform and monotone span program
design a hybrid secret sharing. This hybrid scheme has the advantages of both classical and …

Provably secure verifiable multi‐stage secret sharing scheme based on monotone span program

S Mashhadi, M Hadian Dehkordi… - IET Information …, 2017 - Wiley Online Library
In multi‐secret sharing (MSS) scheme, a dealer distributes multiple secrets among a set of
participants, each of them according to an access structure. In this study, the authors …

Verifiable varying sized (m, n, n) multi-image secret sharing with combiner verification and cheater identification

AV Soreng, S Kandar - Journal of Visual Communication and Image …, 2022 - Elsevier
In conventional multi-image secret sharing schemes (MISSS) images are shared by the
trusted dealer and the shares are sent to the set of participants through a secure channel …

Information privacy protection based on verifiable (t, n)-Threshold multi-secret sharing scheme

N Wang, Y Cai, J Fu, X Chen - IEEE Access, 2020 - ieeexplore.ieee.org
General secret sharing schemes comprise a secret dealer and a number of participants. The
dealer can randomly generate a secret and then distribute shares of the secret to the …

A non-interactive (tn)-publicly verifiable multi-secret sharing scheme

S Mashahdi, B Bagherpour, A Zaghian - Designs, Codes and …, 2022 - Springer
A non-interactive publicly verifiable multi secret sharing (PVMSS) scheme is a secret sharing
scheme that the dealer shares multiple secrets among the participants and anyone can …

[PDF][PDF] Batch-verifiable Secret Sharing with Unconditional Privacy.

S Krenn, T Lorünser, C Striecks - ICISSP, 2017 - scitepress.org
We propose the first batch-verifiable secret sharing scheme with a significant security
property, namely that of unconditional privacy. Verifiability and privacy of secret-shared …

Verifiable secret sharing scheme without dealer based on vector space access structures over bilinear groups

N Wang, J Fu, J Zeng - Electronics Letters, 2018 - Wiley Online Library
In general, most of the previous secret sharing schemes involve a secret dealer and a
number of participants. The dealer generates a secret and then distributes the secret shares …