期刊文献+
共找到170篇文章
< 1 2 9 >
每页显示 20 50 100
Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms 被引量:3
1
作者 Keyao Li Yiming Wang +6 位作者 Dapu Pi Baoli Li Haitao Luan Xinyuan Fang Peng Chen Yanqing Lu Min Gu 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第1期28-35,共8页
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since... Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display. 展开更多
关键词 holographic encryption optical secret sharing cascaded liquid crystal hologram multi-dimensional multiplexing
下载PDF
A New Double Layer Multi-Secret Sharing Scheme
2
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
下载PDF
Cryptanalysis of efficient semi-quantum secret sharing protocol using single particles
3
作者 高甘 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期254-257,共4页
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three... In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David. 展开更多
关键词 security loophole rearranging orders semi-quantum secret sharing single particles
下载PDF
Verifiable quantum secret sharing scheme based on orthogonal product states
4
作者 白晨明 刘璐 张素娟 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期178-187,共10页
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc... In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol. 展开更多
关键词 quantum secret sharing quantum product state threshold scheme unitary operations
下载PDF
Blockchain-Based Key Management Scheme Using Rational Secret Sharing
5
作者 Xingfan Zhao Changgen Peng +1 位作者 Weijie Tan Kun Niu 《Computers, Materials & Continua》 SCIE EI 2024年第4期307-328,共22页
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes... Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities. 展开更多
关键词 Blockchain smart contract rational secret sharing key management
下载PDF
Improvement and security analysis of multi-ring discrete modulation continuous variable quantum secret sharing scheme
6
作者 姜欢窈 聂敏 +3 位作者 杨光 孙爱晶 张美玲 裴昌幸 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期189-197,共9页
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos... In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value. 展开更多
关键词 discrete modulation continuous variable quantum secret sharing scheme
下载PDF
NTRU_SSS:Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing 被引量:1
7
作者 Asma Ibrahim Hussein Abeer Tariq MaoLood Ekhlas Khalaf Gbashi 《Computers, Materials & Continua》 SCIE EI 2023年第7期753-769,共17页
With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).... With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).A modified version of the traditional N-Th Degree Truncated Polynomial Ring(NTRU)cryptosystem called NTRU Prime has been developed to reduce the attack surface.In this paper,the Signcryption scheme was proposed,and it is most efficient than others since it reduces the complexity and runs the time of the code execution,and at the same time,provides a better security degree since it ensures the integrity of the sent message,confidentiality of the data,forward secrecy when using refreshed parameters for each session.Unforgeability to prevent the man-in-the-middle attack from being active or passive,and non-repudiation when the sender can’t deny the recently sent message.This study aims to create a novel NTRU cryptography algorithm system that takes advantage of the security features of curve fitting operations and the valuable characteristics of chaotic systems.The proposed algorithm combines the(NTRU Prime)and Shamir’s Secret Sharing(SSS)features to improve the security of the NTRU encryption and key generation stages that rely on robust polynomial generation.Based on experimental results and a comparison of the time required for crucial exchange between NTRU-SSS and the original NTRU,this study shows a rise in complexity with a decrease in execution time in the case when compared to the original NTRU.It’s encouraging to see signs that the suggested changes to the NTRU work to increase accuracy and efficiency. 展开更多
关键词 Post-quantum cryptography NTRU Shamir’s secret sharing public key
下载PDF
Efficient semi-quantum secret sharing protocol using single particles
8
作者 邢丁 王艺霏 +3 位作者 窦钊 李剑 陈秀波 李丽香 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第7期273-278,共6页
Semi-quantum secret sharing(SQSS)is a branch of quantum cryptography which only requires the dealer to have quantum capabilities,reducing the difficulty of protocol implementation.However,the efficiency of the SQSS pr... Semi-quantum secret sharing(SQSS)is a branch of quantum cryptography which only requires the dealer to have quantum capabilities,reducing the difficulty of protocol implementation.However,the efficiency of the SQSS protocol still needs to be further studied.In this paper,we propose a semi-quantum secret sharing protocol,whose efficiency can approach 100%as the length of message increases.The protocol is based on single particles to reduce the difficulty of resource preparation.Particle reordering,a simple but effective operation,is used in the protocol to improve efficiency and ensure security.Furthermore,our protocol can share specific secrets while most SQSS protocols could not.We also prove that the protocol is secure against common attacks. 展开更多
关键词 semi-quantum secret sharing efficiency single particles specific secret particle reordering
下载PDF
An efficient multiparty quantum secret sharing scheme using a single qudit
9
作者 胡文文 熊邦书 周日贵 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第8期161-170,共10页
The aim of quantum secret sharing,as one of most promising components of quantum cryptograph,is one-tomultiparty secret communication based on the principles of quantum mechanics.In this paper,an efficient multiparty ... The aim of quantum secret sharing,as one of most promising components of quantum cryptograph,is one-tomultiparty secret communication based on the principles of quantum mechanics.In this paper,an efficient multiparty quantum secret sharing protocol in a high-dimensional quantum system using a single qudit is proposed.Each participant's shadow is encoded on a single qudit via a measuring basis encryption method,which avoids the waste of qudits caused by basis reconciliation.Security analysis indicates that the proposed protocol is immune to general attacks,such as the measure-resend attack,entangle-and-measure attack and Trojan horse attack.Compared to former protocols,the proposed protocol only needs to perform the single-qudit measurement operation,and can share the predetermined dits instead of random bits or dits. 展开更多
关键词 quantum secret sharing HIGH-DIMENSIONAL measurement basis encrypted security analysis
下载PDF
Secret Sharing Scheme Based on the Differential Manifold
10
作者 Bin Li 《Applied Mathematics》 2023年第3期173-181,共9页
In this paper, the concepts of topological space and differential manifold are introduced, and it is proved that the surface determined by function F (x<sub>2</sub>, x<sub>2</sub>, …, x<sub... In this paper, the concepts of topological space and differential manifold are introduced, and it is proved that the surface determined by function F (x<sub>2</sub>, x<sub>2</sub>, …, x<sub>t</sub>) of class C<sup>r</sup> in Euelidean R<sup>t</sup> is a differential manifold. Using the intersection of the tangent plane and the hypernormal of the differential manifold to construct the shared master key of participants, an intuitive, secure and complete (t,n)-threshold secret sharing scheme is designed. The paper is proved to be safe, and the probability of successful attack of attackers is only 1/p<sup>t</sup><sup>-1</sup>. When the prime number p is sufficiently large, the probability is almost 0. The results show that this scheme has the characteristics of single-parameter representation of the master key in the geometric method, and is more practical and easy to implement than the Blakley threshold secret sharing scheme. 展开更多
关键词 Topological Space Differential Manifold secret sharing Tangent Plane Hypernormal
下载PDF
A New Rational Secret Sharing Scheme 被引量:4
11
作者 ZHANG En CAI Yongquan 《China Communications》 SCIE CSCD 2010年第4期18-22,共5页
In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round... In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round or fake round.The gain of following the protocol is more than the gain of deviating,so rational player has an incentive to abide the protocol.Finally,every player can obtain the secret fairly.Our scheme is verifiable and any player’s cheating can not work.Furthermore the proposed scheme is immune to backward induction and satisfies resilient equilibrium.No player of the coalition C can do better,even if the whole coalition C cheats.Our scheme can withstand the conspiracy attack with at most m-1 players. 展开更多
关键词 secret sharing Game Theory Verifiable secret sharing Resilient Equilibrium
下载PDF
Verifiable Secret Redistribution for Proactive Secret Sharing Schemes 被引量:4
12
作者 于佳 孔凡玉 李大兴 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期236-241,共6页
A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures a... A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes. 展开更多
关键词 secret sharing verifiable secret redistribution proactive secret sharing
下载PDF
Circular threshold quantum secret sharing 被引量:2
13
作者 杨宇光 温巧燕 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第2期419-423,共5页
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n... This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate. It shows that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties, and each photon can carry one bit of information without quantum storage. This protocol is feasible with current technology. 展开更多
关键词 quantum secret sharing threshold quantum secret sharing quantum secure direct com munication
下载PDF
Dynamic Vector Space Secret Sharing Based on Certificates 被引量:1
14
作者 XU Chunxiang LI Jiajia LIU Dongsu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1253-1256,共4页
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's cert... A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements. 展开更多
关键词 vector space secret sharing dynamic secret sharing CERTIFICATE
下载PDF
NEW SECRET SHARING SCHEME BASED ON LINEAR CODE
15
作者 TanXiaoqing WangZhiguo 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2004年第2期160-166,共7页
A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify h... A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme. 展开更多
关键词 verifiable secret sharing(VSS) scheme secret sharing(SS) scheme linear code finite field(Galois field).
下载PDF
Some Secret Sharing Schemes Based on the Finite Fields
16
作者 Selda Calkavur 《Computer Technology and Application》 2016年第6期269-272,共4页
A (t, n)--secret sharing scheme is a method of distribution of information among n participants such that t 〉 1 can reconstruct the secret but (t - 1) cannot. We explore some (k, n)--secret sharing schemes base... A (t, n)--secret sharing scheme is a method of distribution of information among n participants such that t 〉 1 can reconstruct the secret but (t - 1) cannot. We explore some (k, n)--secret sharing schemes based on the finite fields. 展开更多
关键词 secret sharing threshold secret sharing scheme finite field.
下载PDF
A Verifiable Multi-Secret Sharing Scheme Based on Hermite Interpolation
17
作者 Tomoko Adachi Chie Okazaki 《Journal of Mathematics and System Science》 2014年第9期587-592,共6页
A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key... A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one key, that is, a multi-secret sharing scheme has p (〉_ 2) keys. Dealer distribute shares of keys among n participants. Gathering t (〈 n) participants, keys can be reconstructed. Yang et al. (2004) gave a scheme of a (t, n) multi-secret sharing based on Lagrange's interpolation. Zhao et al. (2007) gave a scheme of a (t, n) verifiable multi-secret sharing based on Lagrange's interpolation. Recently, Adachi and Okazaki give a scheme of a (t, n) multi-secret sharing based on Hermite interpolation, in the case ofp 〈 t. In this paper, we give a scheme ofa (t, n) verifiable multi-secret sharing based on Hermite interpolation. 展开更多
关键词 Verifiable secret sharing scheme Multi-secret sharing scheme Hermite interpolation
下载PDF
Efficient Data Integrity Using Enhanced Secret Sharing Scheme for MANET
18
作者 R. Mohandas Rengaraju K. Krishnamoorthi 《Circuits and Systems》 2016年第10期3174-3182,共9页
Mobile Ad Hoc Networks consist of nodes which are wireless and get organized based on the transmission requirement. These nodes are mobile nodes, so they communicate with each other without any fixed access point. Thi... Mobile Ad Hoc Networks consist of nodes which are wireless and get organized based on the transmission requirement. These nodes are mobile nodes, so they communicate with each other without any fixed access point. This type of network faces several attacks because of its mobility nature. In MANET, black hole attacks may cause packet dropping or misrouting of packets during transmission from sender to receiver. This may lead to performance degradation in the network. To surmount this issue, we propose the modified secret sharing scheme to provide the data protection from unauthorized nodes, consistency of data and genuineness. In this algorithm, initially the identification of black hole attacks is achieved and followed by data protection from malicious nodes and also this scheme checks for the reality of the data. Here, we detect the misbehaviour that is dropping or misrouting using verifiable secret sharing scheme. The proposed algorithm achieves the better packet delivery ratio, misbehaviour detection efficiency, fewer packets overhead and end-to-end delay than the existing schemes. These can be viewed in the simulation results. 展开更多
关键词 MANET Verifiable secret sharing Modified Proactive secret sharing Scheme End-to-End Delay OVERHEAD Misbehaviour Detection Efficiency and Delivery Ratio
下载PDF
High-dimension multiparty quantum secret sharing scheme with Einstein-Podolsky-Rosen pairs 被引量:4
19
作者 陈攀 邓富国 龙桂鲁 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第10期2228-2235,共8页
In this paper a high-dimension multiparty quantum secret sharing scheme is proposed by using Einstein-Podolsky-Rosen pairs and local unitary operators. This scheme has the advantage of not only having higher capacity,... In this paper a high-dimension multiparty quantum secret sharing scheme is proposed by using Einstein-Podolsky-Rosen pairs and local unitary operators. This scheme has the advantage of not only having higher capacity, but also saving storage space. The security analysis is also given. 展开更多
关键词 high—dimension quantum secret sharing EPR QUBIT QUTRIT
下载PDF
Participant attack on quantum secret sharing based on entanglement swapping 被引量:4
20
作者 宋婷婷 张劼 +2 位作者 高飞 温巧燕 朱甫臣 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第4期1333-1337,共5页
The security of quantum secret sharing based on entanglement swapping is revisited and a participant attack is presented. In this attack two dishonest agents together can illegally recover the secret quantum state wit... The security of quantum secret sharing based on entanglement swapping is revisited and a participant attack is presented. In this attack two dishonest agents together can illegally recover the secret quantum state without the help of any other controller, and it will not be detected by any other users. Furthermore, by modifying the distribution process of particles and adding a detection step after each distribution process, we propose an improved protocol which can resist this kind of attack. 展开更多
关键词 quantum secret sharing entanglement swapping the Bell measurement two-particleentangled state
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部