Threshold changeable secret image sharing scheme based on interpolation polynomial
YX Liu, CN Yang, CM Wu, QD Sun, W Bi - Multimedia Tools and …, 2019 - Springer
In previous (k, n) secret image sharing scheme, the threshold k is decided by dealer
according to the security requirement, and this threshold value is fixed without considering …
according to the security requirement, and this threshold value is fixed without considering …
A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem
X Jia, D Wang, D Nie, X Luo, JZ Sun - Information sciences, 2019 - Elsevier
A general (t, n) secret sharing (SS) scheme with fixed threshold allows a secret to be shared
without considering the time dynamic nature of the security environment. In this paper, we …
without considering the time dynamic nature of the security environment. In this paper, we …
Simple and efficient threshold changeable secret sharing
Abstract Shamir's (t, n) threshold secret sharing (SS) is one of the most important
cryptographic primitives in various security applications designed to protect highly sensitive …
cryptographic primitives in various security applications designed to protect highly sensitive …
Changeable essential threshold secret image sharing scheme with verifiability using bloom filter
M Hadian Dehkordi, S Mashhadi, ST Farahi… - Multimedia Tools and …, 2024 - Springer
In threshold secret image sharing schemes (k, n), the secret image S is distributed among n
shareholders. To recover the secret image, at least k shareholders must be present during …
shareholders. To recover the secret image, at least k shareholders must be present during …
[HTML][HTML] A trapdoor one-way function for verifiable secret sharing
A Kanso, M Ghebleh - High-Confidence Computing, 2022 - Elsevier
This paper proposes a (t, n)–threshold verifiable secret sharing scheme with changeable
parameters based on a trapdoor one-way function. This scheme consists of a generation …
parameters based on a trapdoor one-way function. This scheme consists of a generation …
Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem
M Hadian Dehkordi, S Mashhadi, ST Farahi… - Wireless Personal …, 2024 - Springer
In common threshold secret image sharing (t, n) schemes, each of n shareholders has a
share of secret image S. By having at least t shares, the dealer D will be able to retrieve the …
share of secret image S. By having at least t shares, the dealer D will be able to retrieve the …
(k, n) scalable secret image sharing with multiple decoding options
YX Liu, CN Yang, QD Sun… - Journal of Intelligent & …, 2020 - content.iospress.com
Traditional (k, n) secret image sharing provides all-or-nothing decoding model and (k, n)
scalable secret image sharing provides progress decoding model during image …
scalable secret image sharing provides progress decoding model during image …
Dynamic hierarchical quantum secret sharing with general access structure
F Li, T Chen, H Zhu, S Zhu, B Pang - Quantum Information Processing, 2023 - Springer
Quantum secret sharing is one of the important techniques in quantum cryptography. In this
paper, we propose a novel dynamic hierarchical quantum secret sharing scheme with …
paper, we propose a novel dynamic hierarchical quantum secret sharing scheme with …
A novel threshold changeable secret sharing scheme
A (t, n) threshold secret sharing scheme is a fundamental tool in many security applications
such as cloud computing and multiparty computing. In conventional threshold secret sharing …
such as cloud computing and multiparty computing. In conventional threshold secret sharing …
Addressing escalating threats: a secret image sharing scheme with adjustable threshold resilience against external adversaries and colluding participants
We propose a novel threshold changeable secret image sharing (TCSIS) scheme based on
univariate and asymmetric bivariate polynomials for securing greyscale and colour secret …
univariate and asymmetric bivariate polynomials for securing greyscale and colour secret …