Academic literature on the topic 'Authentication and secret sharing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Authentication and secret sharing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Authentication and secret sharing"
Choudhary, Shipra PraveenKumar, Apeksha Katarni, Shweta Manjrekar, Mrs Vidyullata Devmane, and Mrs Vaishali Hirlekar. "Secret Sharing Approach in Multi-database System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 6 (April 20, 2016): 6819–23. http://dx.doi.org/10.24297/ijct.v15i6.1606.
Full textS.Patil, Rupali, Sonali Patil, and Sudeep D. Thepade. "Secret Sharing based Secure Authentication System." International Journal of Computer Applications 118, no. 22 (May 20, 2015): 8–11. http://dx.doi.org/10.5120/20875-3613.
Full textSirdeshpande, Janhavi, and Sonali Patil. "Amended Biometric Authentication using Secret Sharing." International Journal of Computer Applications 98, no. 21 (July 18, 2014): 28–32. http://dx.doi.org/10.5120/17308-7770.
Full textSun Ying, Du Jian-Zhong, Qin Su-Juan, Wen Qiao-Yan, and Zhu Fu-Chen. "Quantum secret sharing with bidirectional authentication." Acta Physica Sinica 57, no. 8 (2008): 4689. http://dx.doi.org/10.7498/aps.57.4689.
Full textTu, Shu-Fen, Ching-Sheng Hsu, and Fu-Hsing Wang. "Application of Threshold Secret Sharing to Image Authentication and Recovery." SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 01, no. 05 (December 2, 2013): 32–38. http://dx.doi.org/10.9756/sijcsea/v1i5/0104640402.
Full textBezzateev, Sergey, Vadim Davydov, and Aleksandr Ometov. "On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication." Cryptography 4, no. 4 (December 1, 2020): 34. http://dx.doi.org/10.3390/cryptography4040034.
Full textLin, Chang-Chou, and Wen-Hsiang Tsai. "Secret image sharing with steganography and authentication." Journal of Systems and Software 73, no. 3 (November 2004): 405–14. http://dx.doi.org/10.1016/s0164-1212(03)00239-5.
Full textArafin, Md Tanvir, and Gang Qu. "Memristors for Secret Sharing-Based Lightweight Authentication." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26, no. 12 (December 2018): 2671–83. http://dx.doi.org/10.1109/tvlsi.2018.2823714.
Full textJiang, Yue, Xuehu Yan, Jianqing Qi, Yuliang Lu, and Xuan Zhou. "Secret Image Sharing with Dealer-Participatory and Non-Dealer-Participatory Mutual Shadow Authentication Capabilities." Mathematics 8, no. 2 (February 12, 2020): 234. http://dx.doi.org/10.3390/math8020234.
Full textZhu, Yuesheng, Bojun Wang, and Cheng Cai. "A Novel Smart-Card Based Authentication Scheme Using Proactive Secret Sharing." International Journal of Computer and Communication Engineering 5, no. 3 (2016): 196–205. http://dx.doi.org/10.17706/ijcce.2016.5.3.196-205.
Full textDissertations / Theses on the topic "Authentication and secret sharing"
Miceli, Christopher. "One Time Password Scheme Via Secret Sharing Techniques." ScholarWorks@UNO, 2011. http://scholarworks.uno.edu/td/1330.
Full textAl-Adhami, Ayad. "A secure quorum based multi-tag RFID system." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12821.
Full textAdeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.
Full textReyzin, Alissa Natanovna. "Rational secret sharing." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/46511.
Full textIncludes bibliographical references (p. 59-60).
Recent work has attempted to bridge the fields of Cryptography and Game Theory in order to create more robust protocols that allow for a variety of player types. A keystone functionality used in cryptography is Secret Sharing. While there are several well known, efficient protocols that implement Secret Sharing in the Cryptographic model, designing a Rational Secret Sharing protocol which works in the Game Theoretic model has proved challenging. In this thesis, we contrast several recently proposed protocols for Rational Secret Sharing based on their channel models, utility tolerances, equilibrium types, and efficiencies. We also discuss two more general results bridging Cryptography and Game Theory that can be used to construct Rational Secret Sharing protocols. Finally, we highlight several issues of context that influence the ways in which Rational Secret Sharing protocols might be used.
by Alissa Natanovna Reyzin.
M.Eng.
Farràs, Ventura Oriol. "Multipartite secret sharing schemes." Doctoral thesis, Universitat Politècnica de Catalunya, 2010. http://hdl.handle.net/10803/77919.
Full textEl tema d'aquesta tesi són els esquemes de compartició de secrets, uns mètodes criptogràfics que permeten fragmentar missatges de manera segura. En particular s'aborden dos dels principals problemes oberts en aquest camp: la caracterització de les estructures d'accés que admeten esquemes de compartició de secrets ideals i l'optimització de la llargada dels fragments en construccions per estructures d'accés generals. Aquests problemes oberts s'estudien per estructures d'accés multipartides, que són estructures en què el conjunt de participants està dividit en diferents parts i a cada part tots els participants tenen el mateix rol. Aquest plantejament resulta útil per estudiar famílies d'estructures d'accés en què el nombre de parts és petit i estructures en què hi ha alguna relació especial entre les parts, com les jeràrquiques i les compartmentades. L'eina principal d'aquest estudi és una nova propietat de les estructures ideals que es presenta en aquesta tesi, una connexió entre les estructures ideals multipartides i els polimatroides enters. A partir d'aquesta connexió s'obté una condició suficient i una de necessària perquè una estructura d'accés multipartida sigui ideal. Així, aquesta connexió permet discutir la idealitat de les estructures d'accés i també, en el cas que el polimatoride sigui representable, construir esquemes ideals a partir de les representacions. Aplicant aquests resultats s'obté un nou marc per descriure i analitzar mètodes per construir esquemes multipartits ideals. Com a resultat d'aquest estudi s'obté una caracterització completa de les estructures d'accés tripartides ideals i de les jeràrquiques ideals. Una estructura és jeràrquica si el conjunt de participants es pot ordenar de tal manera que si en un conjunt autoritzat es canvia un participant per un de jeràrquicament superior, el nou conjunt també és autoritzat. A partir d'aquest resultat s'obté una nova caracterització de les estructures de llindar amb pesos ideals. Després d'analitzar tots els esquemes de compartició de secrets ideals multipartits presentats fins l'actualitat, es mostra que tots ells estan relacionats amb una família molt senzilla de polimatroides enters, els booleans. A partir d'aquests polimatroides s'obté una nova família d'estructures ideals, les compartmentades, que inclouen diverses famílies estudiades prèviament. L'altre problema obert considerat a la tesi, l'estudi de l'optimització de la llargada dels fragments, es centra en les estructures bipartides. Combinant tècniques de programació lineal i polimatroides, es presenta un mètode per calcular fites en la llargada dels fragments per estructures d'accés no ideals que és vàlid per qualsevol estructura multipartida. A partir de tècniques algebraiques es presenten noves fites i una família d'esquemes bipartits òptims.
Schultz, David Andrew. "Mobile Proactive secret sharing." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/40535.
Full textMIT Barker Engineering Library copy: issued in leaves.
Includes bibliographical references (p. 153-157).
This thesis describes mobile proactive secret sharing (MPSS), an extension of proactive secret sharing. Mobile proactive secret sharing is much more flexible than proactive secret sharing in terms of group membership: instead of the group of shareholders being exactly the same from one epoch to the next, we allow the group to change arbitrarily. In addition, we allow for an increase or decrease of the threshold at each epoch. We give the first known efficient protocol for MPSS in the asynchronous network model. We present this protocol as a practical solution to the problem of long-term protection of a secret in a realistic network.
by David Andrew Schultz.
S.M.
Dryjanski, David. "Practical Mobile Proactive Secret Sharing." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/45993.
Full textIncludes bibliographical references (p. 59-60).
Secret sharing schemes are needed to store and protect secrets in large scale distributed systems. These schemes protect a secret by dividing the it into shares and distributing the shares to multiple shareholders. This way the compromise of a single shareholder does not reveal the secret. Many new secret sharing schemes, such as Proactive Secret Sharing, have been developed to combat the increasing threat from malicious nodes and keep systems secure. However, most of these schemes can be compromised over time, since share transfer and redistribution are static: the set of shareholders is fixed. Mobile Proactive Secret Sharing (MPSS) is a new protocol with dynamic redistribution that can adapt to Byzantine faults and remain secure for the duration of long-lived systems. This thesis describes the simulation, testing, and evaluation of the MPSS protocol to better understand the performance trade-offs and practicality of secret sharing protocols operating in Byzantine faulty environments. The thesis evaluates the original MPSS scheme and the MPSS scheme with verifiable accusations in a distributed setting, finds that both schemes are practical, and explores the performance trade-offs between the two schemes.
by David Dryjanski.
M.Eng.
Johansson, Håkan. "Secret Sharing with Threshold Schemes." Thesis, Linnéuniversitetet, Institutionen för matematik (MA), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97619.
Full textYuan, Jin. "Secret sharing schemes from linear codes /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?COMP%202005%20YUAN.
Full textAlkharobi, Talal M. "Secret sharing using artificial neural network." Diss., Texas A&M University, 2004. http://hdl.handle.net/1969.1/1223.
Full textBooks on the topic "Authentication and secret sharing"
Visual cryptography and secret image sharing. Boca Raton, FL: Taylor & Francis, 2011.
Find full textCrary, Elizabeth. The secret of toddler sharing: Why sharing is hard and how to make it easier. Seattle, Wash: Parenting Press, 2013.
Find full textSharing secrets with Stalin: How the Allies traded intelligence, 1941-1945. [Lawrence, Kan.]: University Press of Kansas, 1996.
Find full textSharing the secret: The history of the Intelligence Corps, 1940 - 2010. Barnsley, South Yorkshire: Pen & Sword Military, 2013.
Find full textSmith, Michal. Aladdin's magic: The company's magic is no secret : communicating, sharing information are keys to success. [Washington, D.C: U.S. Dept. of Labor, Bureau of Labor-Management Relations and Cooperative Programs, 1988.
Find full textMyasnikov, Alexei G. Non-commutative cryptography and complexity of group-theoretic problems. Providence, R.I: American Mathematical Society, 2011.
Find full textBook chapters on the topic "Authentication and secret sharing"
Nag, Amitava, Sushanta Biswas, Debasree Sarkar, and Partha Pratim Sarkar. "Image Secret Sharing in Stego-Images with Authentication." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 764–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37949-9_66.
Full textXu, Rui, Kirill Morozov, and Tsuyoshi Takagi. "Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication." In Advances in Information and Computer Security, 72–87. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09843-2_6.
Full textSanyasi Naidu, P., and Reena Kharat. "Secure Authentication in Online Voting System Using Multiple Image Secret Sharing." In Communications in Computer and Information Science, 336–43. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2738-3_29.
Full textManasi, Jana, and Jana Biswapati. "Authentication on Interpolated Subsampled Based Image Steganography Exploiting Secret Sharing." In Advances in Intelligent Systems and Computing, 681–90. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7834-2_63.
Full textKikuchi, Ryo, Koji Chida, Dai Ikarashi, and Koki Hamada. "Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation." In Cryptology and Network Security, 179–96. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26823-1_13.
Full textMohamed Fathimal, P., and P. Arockia Jansi Rani. "K Out of N Secret Sharing Scheme with Steganography and Authentication." In Advances in Intelligent Systems and Computing, 413–25. Singapore: Springer Singapore, 2015. http://dx.doi.org/10.1007/978-981-10-0251-9_39.
Full textEskicioglu, Ahmet M. "A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast Networks." In Communications and Multimedia Security Issues of the New Century, 363–73. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-0-387-35413-2_30.
Full textUlutas, Guzin, Mustafa Ulutas, and Vasif Nabiyev. "Improved Secret Image Sharing Method By Encoding Shared Values With Authentication Bits." In Computer and Information Sciences II, 331–35. London: Springer London, 2011. http://dx.doi.org/10.1007/978-1-4471-2155-8_42.
Full textBiswas, Samarpita, Nicole Belinda Dillen, Dipak Kumar Kole, and Aruna Chakraborty. "A Time Efficient Secret Image Sharing Scheme for Group Authentication System Without Pixel Expansions." In Advances in Intelligent Systems and Computing, 55–63. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2526-3_7.
Full textCheng, Xu, Fulong Chen, Dong Xie, Hui Sun, Cheng Huang, and Zhuyun Qi. "Blockchain-Based Secure Authentication Scheme for Medical Data Sharing." In Communications in Computer and Information Science, 396–411. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0118-0_31.
Full textConference papers on the topic "Authentication and secret sharing"
Arafin, Md Tanvir, and Gang Qu. "Secret Sharing and Multi-user Authentication." In GLSVLSI '16: Great Lakes Symposium on VLSI 2016. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2902961.2903039.
Full textBannore, Aparna, Roshni Shetty, Nikita Shenai, and Vaibhavi Shetty. "User Authentication using Secret Key Sharing." In 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE). IEEE, 2020. http://dx.doi.org/10.1109/ic-etite47903.2020.308.
Full textWang, Shiuh-Jeng, I.-Shuan Lin, Ye-Lin Hsieh, and Chi-Yao Weng. "Secret Sharing Systems with Authentication-Based Steganography." In 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2008. http://dx.doi.org/10.1109/iih-msp.2008.243.
Full textNaveen, Devarapalli, and K. Praveen. "PUF Authentication using Visual Secret Sharing Scheme." In 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS). IEEE, 2019. http://dx.doi.org/10.1109/icaccs.2019.8728504.
Full textLi, Peng, Peijun Ma, and Xiaohong Su. "Image Secret Sharing and Hiding with Authentication." In 2010 First International Conference on Pervasive Computing, Signal Processing and Applications (PCSPA 2010). IEEE, 2010. http://dx.doi.org/10.1109/pcspa.2010.95.
Full textNozaki, Yusuke, and Masaya Yoshikawa. "Secret Sharing Schemes Based Secure Authentication for Physical Unclonable Function." In 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2019. http://dx.doi.org/10.1109/ccoms.2019.8821698.
Full textNimmy K. "Novel multi-server authentication protocol using secret sharing." In 2016 International Conference on Data Mining and Advanced Computing (SAPIENCE). IEEE, 2016. http://dx.doi.org/10.1109/sapience.2016.7684135.
Full textNarad, S. K., M. R. Sayankar, S. V. Alone, and P. S. Mahiskar. "Secret sharing scheme for group authentication — A review." In 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2017. http://dx.doi.org/10.1109/iceca.2017.8203663.
Full textGupta, Kishor Datta, Md Lutfar Rahman, Dipankar Dasgupta, and Subash Poudyal. "Shamir's Secret Sharing for Authentication without Reconstructing Password." In 2020 10th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2020. http://dx.doi.org/10.1109/ccwc47524.2020.9031270.
Full textRajendra, A. B., and H. S. Sheshadri. "Enhanced visual secret sharing for graphical password authentication." In 2012 International Conference on Graphic and Image Processing, edited by Zeng Zhu. SPIE, 2013. http://dx.doi.org/10.1117/12.2010934.
Full textReports on the topic "Authentication and secret sharing"
Vixie, P., O. Gudmundsson, D. Eastlake, and B. Wellington. Secret Key Transaction Authentication for DNS (TSIG). RFC Editor, May 2000. http://dx.doi.org/10.17487/rfc2845.
Full textDupont, F., S. Morris, P. Vixie, D. Eastlake, O. Gudmundsson, and B. Wellington. Secret Key Transaction Authentication for DNS (TSIG). RFC Editor, November 2020. http://dx.doi.org/10.17487/rfc8945.
Full textWong, Theodore M., Chenxi Wang, and Jeannette M. Wing. Verifiable Secret Redistribution for Threshold Sharing Schemes. Fort Belvoir, VA: Defense Technical Information Center, October 2002. http://dx.doi.org/10.21236/ada461227.
Full textVanderveen, M., and H. Soliman. Extensible Authentication Protocol Method for Shared-secret Authentication and Key Establishment (EAP-SAKE). RFC Editor, November 2006. http://dx.doi.org/10.17487/rfc4763.
Full textKwan, S., P. Garg, J. Gilroy, L. Esibov, J. Westhead, and R. Hall. Generic Security Service Algorithm for Secret Key Transaction Authentication for DNS (GSS-TSIG). RFC Editor, October 2003. http://dx.doi.org/10.17487/rfc3645.
Full text