Academic literature on the topic 'Multi-Stage Secret Sharing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multi-Stage Secret Sharing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Multi-Stage Secret Sharing"

1

Endurthi, Anjaneyulu, Oinam B. Chanu, Appala N. Tentu, and V. Ch Venkaiah. "Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT." Journal of Communications Software and Systems 11, no. 1 (2015): 15. http://dx.doi.org/10.24138/jcomss.v11i1.113.

Full text
Abstract:
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8]. The first scheme that uses the Mignotte’s sequence is a single secret scheme; the second one is an extension of the first one to Multi-secret sharing scheme. The third scheme is again for the case of multi-secrets but it is an improvement over the second scheme in the sense that it reduces the number of publicvalues. The first scheme that uses the Asmuth-
APA, Harvard, Vancouver, ISO, and other styles
2

Ebrahimi, Kiasari Mohammad Ebrahim, Nasrollah Pakniat, Abdolrasoul Mirghadri, and Mojtaba Nazari. "A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem." ISC International Journal of Information Security 15, no. 1 (2023): 125–35. https://doi.org/10.22042/isecure.2022. 293948.689.

Full text
Abstract:
Secret sharing (SS) schemes allow the sharing of a secret among a set of trustees in such a way that only some qualified subsets of them can recover the secret.‎ Ordinary SS schemes assume that the trust to each trustee is fixed over time.‎ However, this is not the case in many real scenarios.‎ Social secret sharing (SSS) is a recently introduced type of SS that addresses this issue.‎ It allows the sharing of a secret among a set of trustees such that the amount of trust to each participant could be changed over time.‎ There exist only a few SSS schemes in the literature;&l
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Guoai, Jiangtao Yuan, Guosheng Xu, and Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier." Information Technology and Control 50, no. 2 (2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.

Full text
Abstract:
Multi-stage secret sharing scheme is practical in the case that there is a security system with m ordered checkpoints.It is natural to divide the m checkpoints into m different levels. There are m different secrets, and eachof them with a different importance corresponds to a checkpoint/level. The participants are also divided intom disjoint levels as they do in the hierarchical threshold access structure. Hierarchical threshold access structurewith the existential quantifier ( HTAS∃ ) does not cover the common practice that at least a few numbersof high-ranking participants are required to be
APA, Harvard, Vancouver, ISO, and other styles
4

Mashhadi, Samaneh. "New multi-stage secret sharing in the standard model." Information Processing Letters 127 (November 2017): 43–48. http://dx.doi.org/10.1016/j.ipl.2017.07.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhou Yousheng, Cheng Mingzhi, Qing Sihan, Jiang Yong, and Cui Wei. "A Novel Multi-stage (t,n) -Threshold Secret Sharing Scheme." International Journal of Advancements in Computing Technology 4, no. 5 (2012): 141–47. http://dx.doi.org/10.4156/ijact.vol4.issue5.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zarepour-Ahmadabadi, Jamal, MohammadEbrahim Shiri-Ahmadabadi, and Alimohammad Latif. "A cellular automata-based multi-stage secret image sharing scheme." Multimedia Tools and Applications 77, no. 18 (2018): 24073–96. http://dx.doi.org/10.1007/s11042-018-5717-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, Ting-Yi, Min-Shiang Hwang, and Wei-Pang Yang. "A new multi-stage secret sharing scheme using one-way function." ACM SIGOPS Operating Systems Review 39, no. 1 (2005): 48–55. http://dx.doi.org/10.1145/1044552.1044557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hadian Dehkordi, Massoud, Samaneh Mashhadi, and Hossein Oraei. "A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure." Wireless Personal Communications 104, no. 1 (2018): 491–503. http://dx.doi.org/10.1007/s11277-018-6032-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

CHEN Yun, LI Xuanbing, and LI Shuai. "Multi-party Quantum Secret Sharing Protocol Based on Orthogonal Product States." Acta Physica Sinica 74, no. 17 (2025): 0. https://doi.org/10.7498/aps.74.20250394.

Full text
Abstract:
Quantum secret sharing (QSS) is a cryptographic protocol that realizes secure distribution and reconstruction of secret information among multiple participants by leveraging fundamental principles of quantum mechanics. Most existing protocols rely on entangled states (such as Bell and GHZ states), but in practical applications, entangled state preparation is constrained by short quantum coherence time, low state fidelity, etc., making it difficult to implement entangled resource-dependent QSS protocols. This paper proposes a novel practical and verifiable multi-party QSS protocol based on orth
APA, Harvard, Vancouver, ISO, and other styles
10

Mashhadi, Samaneh, Massoud Hadian Dehkordi, and Niloofar Kiamari. "Provably secure verifiable multi-stage secret sharing scheme based on monotone span program." IET Information Security 11, no. 6 (2017): 326–31. http://dx.doi.org/10.1049/iet-ifs.2017.0111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Multi-Stage Secret Sharing"

1

Li, Hui-Xian, Chun-Tian Cheng, and Liao-Jun Pang. "An Improved Multi-stage (t, n)-Threshold Secret Sharing Scheme." In Advances in Web-Age Information Management. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11563952_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fatemi, Mitra, Taraneh Eghlidos, and Mohammadreza Aref. "A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach." In Information and Communications Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-11145-7_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ogiela, Marek R., and Urszula Ogiela. "Information Security Management Based on Linguistic Sharing Techniques." In Threats, Countermeasures, and Advances in Applied Information Security. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch009.

Full text
Abstract:
Secure information splitting is used in many tasks of the intelligent sharing of secrets and key data in business organisations. The significance of information splitting depends on its nature, while the significance of information sharing may depend on its importance and the meaning it has for the organisation or institution concerned. This chapter presents models for multi-level information splitting and information management with the use of the linguistic approach and formal grammars. Such methods constitute a secure enhancement of traditional secret splitting algorithms and introduce an additional stage at which information is coded using the appropriately defined regular or context-free grammar. The many possible applications of such methods include their use for the intelligent management of important or confidential information in government institutions or businesses. Algorithms of multi-level information splitting allow information that is not available to all employees of a given organisation or its environment to be securely split or shared.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Multi-Stage Secret Sharing"

1

Li, Xu, Yinghao Wu, Yang Liu, Baosheng Wang, Bei Wang, and Yijun Cui. "Lattice-based Multi-Stage Secret Sharing 3D Secure Encryption Scheme." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Basit, Abdul, N. Chaitanya Kumar, V. Ch Venkaiah, Salman Abdul Moiz, Appala Naidu Tentu, and Wilson Naik. "Multi-stage multi-secret sharing scheme for hierarchical access structure." In 2017 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2017. http://dx.doi.org/10.1109/ccaa.2017.8229863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chanu, Oinam Bidyapati, Appala Naidu Tentu, and V. Ch Venkaiah. "Multi-Stage Multi-Secret Sharing Schemes Based on Chinese Remainder Theorem." In the 2015 International Conference. ACM Press, 2015. http://dx.doi.org/10.1145/2743065.2743082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wei, Yun, Pucha Zhong, and Guohua Xiong. "A Multi-Stage Secret Sharing Scheme with General Access Structures." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.2939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!