Articles with "access structure" as a keyword



Multiple secret image sharing with general access structure

Sign Up to like & get
recommendations!
Published in 2020 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-08524-x

Abstract: Boolean-operation-based secret image sharing (BSIS), which aims to encode a secret image into some shared images and discloses the original secret image later, has drawn more and more attention in academia. Since Chen and Wu… read more here.

Keywords: image; multiple secret; access structure; secret image ... See more keywords

A New Gradual Secret Sharing Scheme with Diverse Access Structure

Sign Up to like & get
recommendations!
Published in 2018 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-5187-y

Abstract: A multi-secret sharing scheme tries to share multiple secrets among a group of players in such a way that co-operation of pre-specified subsets of them, called access structures, can reconstruct the secrets. Existing methods allow… read more here.

Keywords: access structure; new gradual; secret sharing; sharing scheme ... See more keywords

Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval With General Access Structure

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Journal on Selected Areas in Communications"

DOI: 10.1109/jsac.2022.3142375

Abstract: We study the equivalence between non-perfect secret sharing (NSS) and symmetric private information retrieval (SPIR) with arbitrary response and collusion patterns. NSS and SPIR are defined with an access structure, which corresponds to the authorized/forbidden… read more here.

Keywords: inline formula; access structure; tex math;
Photo from wikipedia

Efficient Explicit Constructions of Multipartite Secret Sharing Schemes

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2021.3123102

Abstract: Multipartite secret sharing schemes are those having a multipartite access structure, in which the set of participants is divided into several parts and all participants in the same part play an equivalent role. Secret sharing… read more here.

Keywords: secret sharing; sharing schemes; access structures; multipartite secret ... See more keywords

Information Ratio of Unicyclic Graphs

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2023.3322601

Abstract: Secret sharing is a method to distribute a secret amongst participants, such that only some predefined coalitions, called qualified sets can recover the secret. The set of the qualified subsets is called the access structure,… read more here.

Keywords: unicyclic graphs; information; ratio unicyclic; information ratio ... See more keywords