Threshold changeable secret image sharing scheme based on interpolation polynomial

YX Liu, CN Yang, CM Wu, QD Sun, W Bi - Multimedia Tools and …, 2019 - Springer
In previous (k, n) secret image sharing scheme, the threshold k is decided by dealer
according to the security requirement, and this threshold value is fixed without considering …

A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem

X Jia, D Wang, D Nie, X Luo, JZ Sun - Information sciences, 2019 - Elsevier
A general (t, n) secret sharing (SS) scheme with fixed threshold allows a secret to be shared
without considering the time dynamic nature of the security environment. In this paper, we …

Simple and efficient threshold changeable secret sharing

L Harn, C Hsu, Z Xia, H Xu, S Zeng, F Pang - Journal of Information Security …, 2023 - Elsevier
Abstract Shamir's (t, n) threshold secret sharing (SS) is one of the most important
cryptographic primitives in various security applications designed to protect highly sensitive …

Changeable essential threshold secret image sharing scheme with verifiability using bloom filter

M Hadian Dehkordi, S Mashhadi, ST Farahi… - Multimedia Tools and …, 2024 - Springer
In threshold secret image sharing schemes (k, n), the secret image S is distributed among n
shareholders. To recover the secret image, at least k shareholders must be present during …

[HTML][HTML] A trapdoor one-way function for verifiable secret sharing

A Kanso, M Ghebleh - High-Confidence Computing, 2022 - Elsevier
This paper proposes a (t, n)–threshold verifiable secret sharing scheme with changeable
parameters based on a trapdoor one-way function. This scheme consists of a generation …

Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem

M Hadian Dehkordi, S Mashhadi, ST Farahi… - Wireless Personal …, 2024 - Springer
In common threshold secret image sharing (t, n) schemes, each of n shareholders has a
share of secret image S. By having at least t shares, the dealer D will be able to retrieve the …

(k, n) scalable secret image sharing with multiple decoding options

YX Liu, CN Yang, QD Sun… - Journal of Intelligent & …, 2020 - content.iospress.com
Traditional (k, n) secret image sharing provides all-or-nothing decoding model and (k, n)
scalable secret image sharing provides progress decoding model during image …

Dynamic hierarchical quantum secret sharing with general access structure

F Li, T Chen, H Zhu, S Zhu, B Pang - Quantum Information Processing, 2023 - Springer
Quantum secret sharing is one of the important techniques in quantum cryptography. In this
paper, we propose a novel dynamic hierarchical quantum secret sharing scheme with …

A novel threshold changeable secret sharing scheme

L Harn, C Hsu, Z Xia - Frontiers of Computer Science, 2022 - Springer
A (t, n) threshold secret sharing scheme is a fundamental tool in many security applications
such as cloud computing and multiparty computing. In conventional threshold secret sharing …

Addressing escalating threats: a secret image sharing scheme with adjustable threshold resilience against external adversaries and colluding participants

K Bhat, D Jinwala, Y Prasad… - International Journal of …, 2025 - inderscienceonline.com
We propose a novel threshold changeable secret image sharing (TCSIS) scheme based on
univariate and asymmetric bivariate polynomials for securing greyscale and colour secret …