Journal articles on the topic 'Shamir’s Secret Sharing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Shamir’s Secret Sharing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ding, Wanmeng, Kesheng Liu, Xuehu Yan, Huaixi Wang, Lintao Liu, and Qinghong Gong. "An Image Secret Sharing Method Based on Matrix Theory." Symmetry 10, no. 10 (2018): 530. http://dx.doi.org/10.3390/sym10100530.
Full textHartanto, Ari Dwi, and Sutjijana Sutjijana. "A SECRET SHARING SCHEME BASED ON MULTIVARIATE POLYNOMIALS." Journal of Fundamental Mathematics and Applications (JFMA) 2, no. 2 (2019): 81. http://dx.doi.org/10.14710/jfma.v2i2.41.
Full textYu, Yongqiang, Longlong Li, Yuliang Lu, and Xuehu Yan. "On the Value of Order Number and Power in Secret Image Sharing." Security and Communication Networks 2020 (November 23, 2020): 1–13. http://dx.doi.org/10.1155/2020/6627178.
Full textUteshev, Alexei Yu, and Aleksei V. Marov. "Faulty share detection in Shamir’s secret sharing." Vestnik of Saint Petersburg University. Applied Mathematics. Computer Science. Control Processes 15, no. 2 (2019): 274–82. http://dx.doi.org/10.21638/11701/spbu10.2019.210.
Full textUteshev, Alexei Yu, and Aleksei V. Marov. "Faulty share detection in Shamir’s secret sharing." Vestnik of Saint Petersburg University. Applied Mathematics. Computer Science. Control Processes 15, no. 2 (2019): 274–82. http://dx.doi.org/10.21638/11702/spbu10.2019.210.
Full textPang, Liao-Jun, and Yu-Min Wang. "A new (t,n) multi-secret sharing scheme based on Shamir’s secret sharing." Applied Mathematics and Computation 167, no. 2 (2005): 840–48. http://dx.doi.org/10.1016/j.amc.2004.06.120.
Full textSari, A. N. "Securing graph steganography by using Shamir’s secret sharing." IOP Conference Series: Materials Science and Engineering 830 (May 19, 2020): 032022. http://dx.doi.org/10.1088/1757-899x/830/3/032022.
Full textAgarwal, Ayushi, and Maroti Deshmukh. "3-D plane based extended Shamir’s secret sharing." International Journal of Information Technology 13, no. 2 (2021): 609–12. http://dx.doi.org/10.1007/s41870-020-00607-5.
Full textKamboj, Minakshi, and Sanjeev Rana. "Toward Improving Secret Sharing Scheme Based on Encryption in Cloud Computing Environment." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2669–73. http://dx.doi.org/10.1166/jctn.2020.8964.
Full textPhiri, Kenan Kingsley, and Hyunsung Kim. "Linear (t,n) Secret Sharing Scheme with Reduced Number of Polynomials." Security and Communication Networks 2019 (August 4, 2019): 1–16. http://dx.doi.org/10.1155/2019/5134534.
Full textXu, Guoai, Jiangtao Yuan, Guosheng Xu, and Zhongkai Dang. "An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations." Security and Communication Networks 2021 (July 20, 2021): 1–8. http://dx.doi.org/10.1155/2021/5566179.
Full textTian, Junfeng, and Yue Li. "Anticollusion Attack Strategy Combining Trust Metrics and Secret Sharing for Friendships Protection." Security and Communication Networks 2021 (July 5, 2021): 1–14. http://dx.doi.org/10.1155/2021/9717747.
Full textYu, Long, Lintao Liu, Zhe Xia, Xuehu Yan, and Yuliang Lu. "Lossless and Efficient Secret Image Sharing Based on Matrix Theory Modulo 256." Mathematics 8, no. 6 (2020): 1018. http://dx.doi.org/10.3390/math8061018.
Full textR., Naveena, and Nikhita Salian. "Cloud Computing Security in Multi-Clouds using Shamir’s Secret Sharing Scheme." International Journal of Computer Applications 155, no. 13 (2016): 1–2. http://dx.doi.org/10.5120/ijca2016912051.
Full textGupta, Vanashree, and Smita Bedekar. "ALTERNATIVE TO SHAMIR’S SECRET SHARING SCHEME LAGRANGE INTERPOLATION OVER FINITE FIELD." International Journal of Technical Research & Science 6, no. 3 (2021): 6–13. http://dx.doi.org/10.30780/ijtrs.v06.i03.002.
Full textSinha, Ditipriya, Uma Bhattacharya, and Rituparna Chaki. "RSRP: A Robust Secure Routing Protocol in MANET." Foundations of Computing and Decision Sciences 39, no. 2 (2014): 129–54. http://dx.doi.org/10.2478/fcds-2014-0008.
Full textLi, Lei, and Zhi Li. "A Multi-party Quantum Key Agreement Protocol Based on Shamir’s Secret Sharing." International Journal of Theoretical Physics 58, no. 9 (2019): 3081–90. http://dx.doi.org/10.1007/s10773-019-04187-4.
Full textSingh, Priyanka, and Balasubramanian Raman. "Reversible data hiding based on Shamir’s secret sharing for color images over cloud." Information Sciences 422 (January 2018): 77–97. http://dx.doi.org/10.1016/j.ins.2017.08.077.
Full textBezzateev, Sergey, Vadim Davydov, and Aleksandr Ometov. "On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication." Cryptography 4, no. 4 (2020): 34. http://dx.doi.org/10.3390/cryptography4040034.
Full textLiu, Yunxia, Liang Chen, Mingsheng Hu, Zhijuan Jia, Suimin Jia, and Hongguo Zhao. "A reversible data hiding method for H.264 with Shamir’s (t, n)-threshold secret sharing." Neurocomputing 188 (May 2016): 63–70. http://dx.doi.org/10.1016/j.neucom.2014.10.109.
Full textLiu, Huadong, Tianlong Gu, Yining Liu, Jingcheng Song, and Zhixin Zeng. "Fault-Tolerant Privacy-Preserving Data Aggregation for Smart Grid." Wireless Communications and Mobile Computing 2020 (September 30, 2020): 1–10. http://dx.doi.org/10.1155/2020/8810393.
Full textHsu, Chingfang, Lein Harn, Zhe Xia, and Maoyuan Zhang. "Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir’s SS for 5G Networks." IEEE Access 8 (2020): 203965–71. http://dx.doi.org/10.1109/access.2020.3035278.
Full textChahar, Harendra, B. N. Keshavamurthy, and Chirag Modi. "Privacy-preserving distributed mining of association rules using Elliptic-curve cryptosystem and Shamir’s secret sharing scheme." Sādhanā 42, no. 12 (2017): 1997–2007. http://dx.doi.org/10.1007/s12046-017-0743-4.
Full textNanavati, Nirali R., Prakash Lalwani, and Devesh C. Jinwala. "Analysis and Evaluation of Schemes for Secure Sum in Collaborative Frequent Itemset Mining across Horizontally Partitioned Data." Journal of Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/470416.
Full textLiu, Liang, Zhenhai Hu, and Lisong Wang. "Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks." International Journal of Distributed Sensor Networks 15, no. 7 (2019): 155014771986100. http://dx.doi.org/10.1177/1550147719861005.
Full textLai, Chun-Pong, and Cunsheng Ding. "Several Generalizations of Shamir's Secret Sharing Scheme." International Journal of Foundations of Computer Science 15, no. 02 (2004): 445–58. http://dx.doi.org/10.1142/s0129054104002510.
Full textChoudhary, Shipra PraveenKumar, Apeksha Katarni, Shweta Manjrekar, Mrs Vidyullata Devmane, and Mrs Vaishali Hirlekar. "Secret Sharing Approach in Multi-database System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 6 (2016): 6819–23. http://dx.doi.org/10.24297/ijct.v15i6.1606.
Full textUlutas, Mustafa, Vasif V. Nabiyev, and Guzin Ulutas. "Improvements in Geometry-Based Secret Image Sharing Approach with Steganography." Mathematical Problems in Engineering 2009 (2009): 1–11. http://dx.doi.org/10.1155/2009/187874.
Full textShin, Sang-Ho, Gil-Je Lee, and Kee-Young Yoo. "Nonlinear Secret Image Sharing Scheme." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/418090.
Full textSutjijana, Al, Subanar, and Suparna. "A generalization of Shamir's secret sharing scheme." International Journal of Algebra 9 (2015): 283–90. http://dx.doi.org/10.12988/ija.2015.5637.
Full textDawson, Ed, and Diane Donovan. "The breadth of Shamir's secret-sharing scheme." Computers & Security 13, no. 1 (1994): 69–78. http://dx.doi.org/10.1016/0167-4048(94)90097-3.
Full textXie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.
Full textKim, Young-Sik. "Group Key Transfer Protocol Based on Shamir's Secret Sharing." Journal of Korea Information and Communications Society 39B, no. 9 (2014): 555–60. http://dx.doi.org/10.7840/kics.2014.39b.9.555.
Full textNanavati, Nirali R., Neeraj Sen, and Devesh C. Jinwala. "Analysis and Evaluation of Novel Privacy Preserving Techniques for Collaborative Temporal Association Rule Mining Using Secret Sharing." International Journal of Distributed Systems and Technologies 5, no. 3 (2014): 58–76. http://dx.doi.org/10.4018/ijdst.2014070103.
Full textWang, Zhen, Mark Karpovsky, and Lake Bu. "Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing." IEEE Transactions on Computers 65, no. 8 (2016): 2443–55. http://dx.doi.org/10.1109/tc.2015.2485220.
Full textPaigude, Tejashree, and Prof T. A. Chavan. "Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security." International Journal of Computer Trends and Technology 8, no. 2 (2014): 96–101. http://dx.doi.org/10.14445/22312803/ijctt-v8p118.
Full textAstawa, I. Made Mustika Kerta, and Rahmi Nurazizah. "ANALISIS ATRIBUT KEAMANAN TERHADAP PERBAIKAN PROTOKOL GROUP KEY TRANSFER : PROTOKOL HSU." Jurnal Ilmiah Matematika dan Pendidikan Matematika 9, no. 1 (2017): 13. http://dx.doi.org/10.20884/1.jmp.2017.9.1.2851.
Full textUlutas, Mustafa, Güzin Ulutas, and Vasif V. Nabiyev. "Medical image security and EPR hiding using Shamir's secret sharing scheme." Journal of Systems and Software 84, no. 3 (2011): 341–53. http://dx.doi.org/10.1016/j.jss.2010.11.928.
Full textWang, Kai Ping, Chiang Lung Liu, and Der Chyuan Lou. "Expansion-Free Grayscale Image Sharing Using Meaningful Share Images." Applied Mechanics and Materials 284-287 (January 2013): 3413–17. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3413.
Full textYoeseph, N. M., F. A. Purnomo, B. K. Riasti, M. A. Safiie, and T. N. Hidayat. "Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing." Journal of Physics: Conference Series 776 (November 2016): 012089. http://dx.doi.org/10.1088/1742-6596/776/1/012089.
Full textBelim, S. Yu. "KEY PREALLOCATION PROTOCOL BASED ON A SECRET SHARING SCHEME." Applied Mathematics and Fundamental Informatics 7, no. 2 (2020): 018–22. http://dx.doi.org/10.25206/2311-4908-2020-7-2-18-22.
Full textIslam, Saria, and A. S. M Mahmudul Hasan. "Implementation of Shamir's Secret Sharing on Proactive Network." International Journal of Applied Information Systems 6, no. 2 (2013): 17–22. http://dx.doi.org/10.5120/ijais13-451003.
Full textSteinfeld, R., J. Pieprzyk, and Huaxiong Wang. "Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes." IEEE Transactions on Information Theory 53, no. 7 (2007): 2542–59. http://dx.doi.org/10.1109/tit.2007.899541.
Full textNiranjana, Mrs G., and Ms K. Siva Shalini. "Authentication of grayscale document images using shamir secret sharing scheme." IOSR Journal of Computer Engineering 16, no. 2 (2014): 75–79. http://dx.doi.org/10.9790/0661-16277579.
Full textAlZain, Mohammed A., Alice S. Li, Ben Soh, and Eric Pardede. "Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes." International Journal of Cloud Applications and Computing 5, no. 3 (2015): 35–52. http://dx.doi.org/10.4018/ijcac.2015070103.
Full textBarik, Ram Chandra, Suvamoy Changder, and Sitanshu Sekhar Sahu. "A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography." International Journal of Rough Sets and Data Analysis 6, no. 1 (2019): 18–42. http://dx.doi.org/10.4018/ijrsda.2019010102.
Full textHao, Xiang Ning, Xue Min Wang, and Li Qiong Deng. "A New Protocol for Secure Distributed Multiplication of Two Polynomial Shared Values." Advanced Materials Research 1042 (October 2014): 110–16. http://dx.doi.org/10.4028/www.scientific.net/amr.1042.110.
Full textRodiah, Dyah Anggraini, Fitrianingsih, and Farizan Kazhimi. "Encryption On Grayscale Image For Digital Image Confidentiality Using Shamir Secret Sharing Scheme." Journal of Physics: Conference Series 710 (April 2016): 012034. http://dx.doi.org/10.1088/1742-6596/710/1/012034.
Full text郭, 涌浩. "Universal Verifiability Design for the Combination of N Shamir Threshold Secret Sharing Schemes." Computer Science and Application 09, no. 12 (2019): 2367–74. http://dx.doi.org/10.12677/csa.2019.912263.
Full textThiyagarajan, P., Prasanth Kumar Thandra, J. Rajan, S. A. V. Satyamurthy, and G. Aghila. "Shamir Secret Sharing Scheme with Dynamic Access Structure (SSSDAS): case study on nuclear power plant." Kerntechnik 80, no. 2 (2015): 150–60. http://dx.doi.org/10.3139/124.110489.
Full text