To see the other types of publications on this topic, follow the link: Multi-Stage Secret Sharing.

Journal articles on the topic 'Multi-Stage Secret Sharing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 journal articles for your research on the topic 'Multi-Stage Secret Sharing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Endurthi, Anjaneyulu, Oinam B. Chanu, Appala N. Tentu, and V. Ch Venkaiah. "Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT." Journal of Communications Software and Systems 11, no. 1 (2015): 15. http://dx.doi.org/10.24138/jcomss.v11i1.113.

Full text
Abstract:
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8]. The first scheme that uses the Mignotte’s sequence is a single secret scheme; the second one is an extension of the first one to Multi-secret sharing scheme. The third scheme is again for the case of multi-secrets but it is an improvement over the second scheme in the sense that it reduces the number of publicvalues. The first scheme that uses the Asmuth-
APA, Harvard, Vancouver, ISO, and other styles
2

Ebrahimi, Kiasari Mohammad Ebrahim, Nasrollah Pakniat, Abdolrasoul Mirghadri, and Mojtaba Nazari. "A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem." ISC International Journal of Information Security 15, no. 1 (2023): 125–35. https://doi.org/10.22042/isecure.2022. 293948.689.

Full text
Abstract:
Secret sharing (SS) schemes allow the sharing of a secret among a set of trustees in such a way that only some qualified subsets of them can recover the secret.‎ Ordinary SS schemes assume that the trust to each trustee is fixed over time.‎ However, this is not the case in many real scenarios.‎ Social secret sharing (SSS) is a recently introduced type of SS that addresses this issue.‎ It allows the sharing of a secret among a set of trustees such that the amount of trust to each participant could be changed over time.‎ There exist only a few SSS schemes in the literature;&l
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Guoai, Jiangtao Yuan, Guosheng Xu, and Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier." Information Technology and Control 50, no. 2 (2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.

Full text
Abstract:
Multi-stage secret sharing scheme is practical in the case that there is a security system with m ordered checkpoints.It is natural to divide the m checkpoints into m different levels. There are m different secrets, and eachof them with a different importance corresponds to a checkpoint/level. The participants are also divided intom disjoint levels as they do in the hierarchical threshold access structure. Hierarchical threshold access structurewith the existential quantifier ( HTAS∃ ) does not cover the common practice that at least a few numbersof high-ranking participants are required to be
APA, Harvard, Vancouver, ISO, and other styles
4

Mashhadi, Samaneh. "New multi-stage secret sharing in the standard model." Information Processing Letters 127 (November 2017): 43–48. http://dx.doi.org/10.1016/j.ipl.2017.07.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhou Yousheng, Cheng Mingzhi, Qing Sihan, Jiang Yong, and Cui Wei. "A Novel Multi-stage (t,n) -Threshold Secret Sharing Scheme." International Journal of Advancements in Computing Technology 4, no. 5 (2012): 141–47. http://dx.doi.org/10.4156/ijact.vol4.issue5.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zarepour-Ahmadabadi, Jamal, MohammadEbrahim Shiri-Ahmadabadi, and Alimohammad Latif. "A cellular automata-based multi-stage secret image sharing scheme." Multimedia Tools and Applications 77, no. 18 (2018): 24073–96. http://dx.doi.org/10.1007/s11042-018-5717-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, Ting-Yi, Min-Shiang Hwang, and Wei-Pang Yang. "A new multi-stage secret sharing scheme using one-way function." ACM SIGOPS Operating Systems Review 39, no. 1 (2005): 48–55. http://dx.doi.org/10.1145/1044552.1044557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hadian Dehkordi, Massoud, Samaneh Mashhadi, and Hossein Oraei. "A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure." Wireless Personal Communications 104, no. 1 (2018): 491–503. http://dx.doi.org/10.1007/s11277-018-6032-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

CHEN Yun, LI Xuanbing, and LI Shuai. "Multi-party Quantum Secret Sharing Protocol Based on Orthogonal Product States." Acta Physica Sinica 74, no. 17 (2025): 0. https://doi.org/10.7498/aps.74.20250394.

Full text
Abstract:
Quantum secret sharing (QSS) is a cryptographic protocol that realizes secure distribution and reconstruction of secret information among multiple participants by leveraging fundamental principles of quantum mechanics. Most existing protocols rely on entangled states (such as Bell and GHZ states), but in practical applications, entangled state preparation is constrained by short quantum coherence time, low state fidelity, etc., making it difficult to implement entangled resource-dependent QSS protocols. This paper proposes a novel practical and verifiable multi-party QSS protocol based on orth
APA, Harvard, Vancouver, ISO, and other styles
10

Mashhadi, Samaneh, Massoud Hadian Dehkordi, and Niloofar Kiamari. "Provably secure verifiable multi-stage secret sharing scheme based on monotone span program." IET Information Security 11, no. 6 (2017): 326–31. http://dx.doi.org/10.1049/iet-ifs.2017.0111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Pilaram, Hossein, and Taraneh Eghlidos. "An Efficient Lattice Based Multi-stage Secret Sharing Scheme." IEEE Transactions on Dependable and Secure Computing, 2015, 1. http://dx.doi.org/10.1109/tdsc.2015.2432800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Yang, Zhichao, Debiao He, Longjiang Qu, and Jianqiao Xu. "On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme." IEEE Transactions on Dependable and Secure Computing, 2022, 1–2. http://dx.doi.org/10.1109/tdsc.2022.3209011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Chang, Ting-Yi, Min-Shiang Hwang, and Wei-Pang Yang. "An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem." Information Technology And Control 40, no. 3 (2011). http://dx.doi.org/10.5755/j01.itc.40.3.633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Pilaram, Hossein, Taraneh Eghlidos, and Rahim Toluee. "An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing." IET Information Security, December 28, 2020. http://dx.doi.org/10.1049/ise2.12007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kuppers, Petra. "“your darkness also/rich and beyond fear”: Community Performance, Somatic Poetics and the Vessels of Self and Other." M/C Journal 12, no. 5 (2009). http://dx.doi.org/10.5204/mcj.203.

Full text
Abstract:
“Communicating deep feeling in linear solid blocks of print felt arcane, a method beyond me” — Audre Lorde in an interview with Adrienne Rich (Lorde 87) How do you disclose? In writing, in spoken words, in movements, in sounds, in the quiet energetic vibration and its trace in discourse? Is disclosure a narrative account of a self, or a poetic fragment, sent into the world outside the sanction of a story or another recognisable form (see fig. 1)?These are the questions that guide my exploration in this essay. I meditate on them from the vantage point of my own self-narrative, as a community pe
APA, Harvard, Vancouver, ISO, and other styles
16

Campanioni, Chris. "How Bizarre: The Glitch of the Nineties as a Fantasy of New Authorship." M/C Journal 21, no. 5 (2018). http://dx.doi.org/10.5204/mcj.1463.

Full text
Abstract:
As the ball dropped on 1999, is it any wonder that No Doubt played, “It’s the End of the World as We Know It” by R.E.M. live on MTV? Any discussion of the Nineties—and its pinnacle moment, Y2K—requires a discussion of both the cover and the glitch, two performative and technological enactments that fomented the collapse between author-reader and user-machine that has, twenty years later, become normalised in today’s Post Internet culture. By staging failure and inviting the audience to participate, the glitch and the cover call into question the original and the origin story. This breakdown of
APA, Harvard, Vancouver, ISO, and other styles
17

Sarı, Simay, and Onur Mengi. "The Role of Creative Placemaking." M/C Journal 25, no. 3 (2022). http://dx.doi.org/10.5204/mcj.2899.

Full text
Abstract:
Introduction The evolution of creative city paradigm in the last three decades has dramatically changed the notion of placemaking and the meaning of art and design for urban development in the creative and cultural economy context. Very recently, a spontaneously emerging art district has been exploited by policy actions in many cities, resulting in its presence on the global stage at the UNESCO Creative City Network. The two most common approaches that drive art and design-based development policies are seen in the creative city approach and community development approach (Evans; Murdoch III e
APA, Harvard, Vancouver, ISO, and other styles
18

Davis, Susan. "Wandering and Wildflowering: Walking with Women into Intimacy and Ecological Action." M/C Journal 22, no. 4 (2019). http://dx.doi.org/10.5204/mcj.1566.

Full text
Abstract:
Hidden away at the ends of streets, behind suburban parks and community assets, there remain remnants of the coastal wallum heathlands that once stretched from Caloundra to Noosa, in Queensland, Australia. From late July to September, these areas explode with colour, a springtime wonderland of white wedding bush, delicate ground orchids, the pastels and brilliance of pink boronias, purple irises, and the diverse profusion of yellow bush peas. These gifts of nature are still relatively unknown and unappreciated, with most locals, and Australians at large, having little knowledge of the remarkab
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!