Articles with "based secret" as a keyword



Security enhancement of shares generation process for multimedia counting-based secret-sharing technique

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6977-2

Abstract: Secret sharing is a cryptographic tool to ensure reliable and secure access to information. Counting-based secret sharing is a new secret sharing technique that generate the preprocessing shares using simple replacements operations of specific bits.… read more here.

Keywords: based secret; shares generation; secret sharing; multimedia ... See more keywords

Trustworthy Target Key Alteration Helping Counting-Based Secret Sharing Applicability

Sign Up to like & get
recommendations!
Published in 2020 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-020-04422-9

Abstract: Sensitive information used online has resulted in the emergence of many security systems to be protected by secret keys. One of these security systems is the so-called secret sharing, in which certain key portions are… read more here.

Keywords: based secret; target; secret sharing; number ... See more keywords

Group verifiable secure aggregate federated learning based on secret sharing

Sign Up to like & get
recommendations!
Published in 2025 at "Scientific Reports"

DOI: 10.1038/s41598-025-94478-0

Abstract: Federated learning is a distributed machine learning approach designed to tackle the problems of data silos and the security of raw data. Nevertheless, it remains susceptible to privacy leakage risks and aggregation server tampering attacks.… read more here.

Keywords: secure; based secret; federated learning; aggregation ... See more keywords

A novel quantum ring signature based on secret sharing

Sign Up to like & get
recommendations!
Published in 2024 at "Modern Physics Letters A"

DOI: 10.1142/s0217732323501754

Abstract: Quantum signature has become a hot topic in the current research of digital signature schemes due to its unconditional security. As a special kind of digital signature, ring signatures are frequently employed in practical situations… read more here.

Keywords: ring signature; based secret; signature; secret sharing ... See more keywords