期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
A New Double Layer Multi-Secret Sharing Scheme
1
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
下载PDF
Secret sharing scheme with inherited characteristic 被引量:1
2
作者 Ye Zhenjun Meng Fanzhen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期916-918,共3页
To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this schem... To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this scheme, each shareholder can produce a new share by his algorithm, which is equivalent to the primary one. Together with other shares, the primary secret can be renewed. Since this scheme is constructed not by replacing the primary share with a new share produced by the dealer in his primitive secret sharing scheme, so no matter how much shares the shareholder produces, these shares can not be gathered together to renew the secret in this scheme. Compared with the existing secret sharing schemes, this scheme provides more agility for the shareholders by investing each of them a function but not affect its security. 展开更多
关键词 CRYPTOGRAPHY secret sharing scheme INHERITED equivalent class.
下载PDF
Efficient Data Integrity Using Enhanced Secret Sharing Scheme for MANET
3
作者 R. Mohandas Rengaraju K. Krishnamoorthi 《Circuits and Systems》 2016年第10期3174-3182,共9页
Mobile Ad Hoc Networks consist of nodes which are wireless and get organized based on the transmission requirement. These nodes are mobile nodes, so they communicate with each other without any fixed access point. Thi... Mobile Ad Hoc Networks consist of nodes which are wireless and get organized based on the transmission requirement. These nodes are mobile nodes, so they communicate with each other without any fixed access point. This type of network faces several attacks because of its mobility nature. In MANET, black hole attacks may cause packet dropping or misrouting of packets during transmission from sender to receiver. This may lead to performance degradation in the network. To surmount this issue, we propose the modified secret sharing scheme to provide the data protection from unauthorized nodes, consistency of data and genuineness. In this algorithm, initially the identification of black hole attacks is achieved and followed by data protection from malicious nodes and also this scheme checks for the reality of the data. Here, we detect the misbehaviour that is dropping or misrouting using verifiable secret sharing scheme. The proposed algorithm achieves the better packet delivery ratio, misbehaviour detection efficiency, fewer packets overhead and end-to-end delay than the existing schemes. These can be viewed in the simulation results. 展开更多
关键词 MANET Verifiable secret sharing Modified Proactive secret sharing scheme End-to-End Delay OVERHEAD Misbehaviour Detection Efficiency and Delivery Ratio
下载PDF
NEW SECRET SHARING SCHEME BASED ON LINEAR CODE
4
作者 TanXiaoqing WangZhiguo 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2004年第2期160-166,共7页
A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify h... A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme. 展开更多
关键词 verifiable secret sharing(VSS) scheme secret sharing(SS) scheme linear code finite field(Galois field).
下载PDF
Linear Secret Sharing Schemes and Rearrangements of Access Structures 被引量:5
5
作者 Liang-liangXiao Mu-lanLiu 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2004年第4期685-694,共10页
关键词 Access structure linear secret sharing scheme monotone span program rearrangement of access structure
原文传递
Constructions for Anonymous Secret Sharing Schemes Using Combinatorial Designs 被引量:1
6
作者 Ying-pu Deng Li-feng Guo Mu-lan Liu 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2007年第1期67-78,共12页
In an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In this paper some constructions of anonymous secret sharing schemes with 2 thresholds b... In an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In this paper some constructions of anonymous secret sharing schemes with 2 thresholds by using combinatorial designs are given. Let v(t, w, q) denote the minimum size of the set of shares of a perfect anonymous (t, w) threshold secret sharing scheme with q secrets. In this paper we prove that v(t, w, q) - Θ(q) if t and w are fixed and that the lower bound of the size of the set of shares in [4] is not optimal under certain condition. 展开更多
关键词 Anonymous secret sharing schemes Steiner systems group divisible designs difference families relative difference sets
原文传递
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
7
作者 Jinqiu Hou Changgen Peng +1 位作者 Weijie Tan Hongfa Ding 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期917-938,共22页
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ... Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure. 展开更多
关键词 LATTICE learning with errors attribute-based proxy re-encryption linear secret sharing schemes
下载PDF
A Novel Secret Sharing Scheme Based on Minimal Linear Codes
8
作者 LI Zhihui SUN Jianhong LI Jing 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期407-412,共6页
In this paper, we propose a novel space efficient secret sharing scheme on the basis of minimal linear codes, which satisfies the definition of a computationally efficient secret sharing scheme. In the scheme, we part... In this paper, we propose a novel space efficient secret sharing scheme on the basis of minimal linear codes, which satisfies the definition of a computationally efficient secret sharing scheme. In the scheme, we partition the underlying minimal linear code into disjoint classes, establishing a one-to-one correspondence between the minimal authorized subsets of participants and the representative codewords of all different classes. Each participant, with only one short share transmitted through a public channel, can share a large secret. Therefore, the proposed scheme can distribute a large secret in practical applications such as secure information dispersal in sensor networks and secure multiparty computation. 展开更多
关键词 secret sharing scheme computationally efficient secret sharing minimal linear code access structure short share
原文传递
Publicly Verifiable Distributed Proxy Blind Signature Scheme
9
作者 MA Chuangui CHENG Rui ZHANG Rurun 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期155-158,共4页
In this present paper, we propose a new proxy blind signature scheme, which is publicly verifiable distributed. The algorithm uses the idea of secret sharing schemes to distribute original signer's ability and the po... In this present paper, we propose a new proxy blind signature scheme, which is publicly verifiable distributed. The algorithm uses the idea of secret sharing schemes to distribute original signer's ability and the power of the proxy signer, and ensure the property of publicly verifiable secret sharing schemes. A new concept "verifiable time period" is also introduced to reduce the time cost in the period of verifications and increases the efficiency of our scheme. 展开更多
关键词 proxy signatures proxy blind signature verifiable secret sharing schemes
下载PDF
A trapdoor one-way function for verifiable secret sharing
10
作者 Ali Kanso Mohammad Ghebleh 《High-Confidence Computing》 2022年第2期34-40,共7页
This paper proposes a(t,n)-threshold verifiable secret sharing scheme with changeable parameters based on a trapdoor one-way function.This scheme consists of a generation phase,a distribution phase,an encoding phase a... This paper proposes a(t,n)-threshold verifiable secret sharing scheme with changeable parameters based on a trapdoor one-way function.This scheme consists of a generation phase,a distribution phase,an encoding phase and a reconstruction phase.The generation and distribution phases are,respectively,based on Shamir’s and Feldman’s approaches,while the encoding phase is based on a novel trapdoor one-way function.In the reconstruction phase,the shares and reconstructed secret are validated using a cryptographic hash function.In comparison with existing schemes,the proposed scheme leaks no direct information about the secret from public information.Furthermore,unlike some existing schemes,the generation and distribution phases of the proposed scheme are both independent of the secret.This feature leads to a number of advantages over existing approaches such as the dealer’s ability to perform the following modifications without updating the shares(i)modify the secret and(ii)adjust the threshold parameters of the scheme.Furthermore,each participant receives a single share,and designated participants can be given the privilege of choosing their own shares for reconstructing a secret S.Moreover,the proposed scheme possesses a high level of security which is inherited from the schemes of Shamir and Feldman,in addition to the trapdoor one-way function and the employed cryptographic hash function. 展开更多
关键词 Shamir’s scheme Feldman’s scheme Verifiable secret sharing schemes secret sharing schemes with changeable threshold parameters Trapdoor one-way function Hash function
原文传递
Consensus with preserved privacy against neighbor collusion
11
作者 Silun Zhang Thomas Ohlson Timoudas Munther ADahleh 《Control Theory and Technology》 EI CSCD 2020年第4期409-418,共10页
This paper proposes a privacy-preserving algorithm to solve the average-consensus problem based on Shamir's secret shar-ing scheme,in which a network of agents reach an agreement on their states without exposing t... This paper proposes a privacy-preserving algorithm to solve the average-consensus problem based on Shamir's secret shar-ing scheme,in which a network of agents reach an agreement on their states without exposing their individual states until an areement is reached.Unlike other methods,the proposed algoritm renders the network resitant to the cllusion of any given number of nighbors(even with all nighbor'clluling).Another virtue of this work is that such a method can protect the network consensus procedure from eavesdropping. 展开更多
关键词 Privacy preserving consensus Cyber security Network control secret sharing scheme
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部