Articles with "sharing scheme" as a keyword



Photo by alex_andrews from unsplash

Distortion less secret image sharing scheme for Internet of Things system

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-1345-y

Abstract: Secret image sharing is the study of sharing a secret image with several participants to prevent the malicious participant obtaining information about the secret image. Traditional methods generate meaningless shares, which are unintelligible and easily… read more here.

Keywords: image; system; secret image; image sharing ... See more keywords

Hybrid image sharing scheme using non-recursive hash key based stream cipher

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6663-4

Abstract: This paper proposes an efficient (k, n)-Hybrid image sharing scheme (HISS) using non-recursive hash key based stream cipher. The sequence generated using non-linear based boolean function is used to construct the Toeplitz matrix to generate… read more here.

Keywords: non recursive; image; stream; hybrid image ... See more keywords

Secure and Efficient Secret Sharing Scheme with General Access Structures Based on Elliptic Curve and Pairing

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3619-8

Abstract: Secret sharing techniques allow a secret to be shared among n participants in such a way that a specified subset of participant can reconstruct the secret by combining their shares. Secret sharing techniques are now… read more here.

Keywords: secret sharing; scheme; sharing scheme; elliptic curve ... See more keywords

A New Gradual Secret Sharing Scheme with Diverse Access Structure

Sign Up to like & get
recommendations!
Published in 2018 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-5187-y

Abstract: A multi-secret sharing scheme tries to share multiple secrets among a group of players in such a way that co-operation of pre-specified subsets of them, called access structures, can reconstruct the secrets. Existing methods allow… read more here.

Keywords: access structure; new gradual; secret sharing; sharing scheme ... See more keywords

The public bicycle-sharing scheme in Brisbane, Australia: evaluating the influence of its introduction on changes in time spent cycling amongst a middle- and older-age population

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of transport and health"

DOI: 10.1016/j.jth.2018.07.003

Abstract: Abstract Background Active travel may improve individual health as it contributes to higher levels of physical activity, particularly in an aging society. Bicycle-sharing schemes may contribute to public health by encouraging active travel. Aim To… read more here.

Keywords: bicycle sharing; spent cycling; sharing scheme; bicycle ... See more keywords
Photo from wikipedia

A spatial analysis of demand patterns on a bicycle sharing scheme: Evidence from London

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Transport Geography"

DOI: 10.1016/j.jtrangeo.2021.103125

Abstract: Abstract This paper investigates the spatial demand for bikesharing through the application of a series of trip generation models for the London Bicycle Sharing Scheme (LBSS). The production of trips from and the arrival of… read more here.

Keywords: spatial analysis; bicycle sharing; sharing scheme; analysis demand ... See more keywords

Verifiable secret sharing scheme without dealer based on vector space access structures over bilinear groups

Sign Up to like & get
recommendations!
Published in 2018 at "Electronics Letters"

DOI: 10.1049/el.2017.1840

Abstract: In general, most of the previous secret sharing schemes involve a secret dealer and a number of participants. The dealer generates a secret and then distributes the secret shares to the participants in a centralised… read more here.

Keywords: dealer; scheme without; secret sharing; scheme ... See more keywords

A verifiable multi-secret sharing scheme based on LCD quadratic residue codes

Sign Up to like & get
recommendations!
Published in 2025 at "International Journal of Computer Mathematics"

DOI: 10.1080/00207160.2025.2493959

Abstract: In this paper, we propose a verifiable multi-secret sharing scheme based on quadratic residue (QR) codes that are linear complementary dual (LCD). By this method, the shareholders can verify each other by putting their shares… read more here.

Keywords: multi secret; verifiable multi; secret sharing; quadratic residue ... See more keywords
Photo by giamboscaro from unsplash

Improvement of a (t,n) Threshold d−Level Quantum Secret Sharing Scheme

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Applied Security Research"

DOI: 10.1080/19361610.2020.1840894

Abstract: Recently, a threshold d − level quantum secret sharing scheme was presented by Song et al. However, Kao et al. showed that in contrary to Song claim, the reconstructor cannot recover the secret wit... read more here.

Keywords: level quantum; threshold level; secret sharing; quantum secret ... See more keywords

Authenticated general hierarchical multi-secret sharing scheme based on high-dimensional quantum system

Sign Up to like & get
recommendations!
Published in 2025 at "Physica Scripta"

DOI: 10.1088/1402-4896/add39c

Abstract: Quantum secret sharing, a pivotal research domain within quantum cryptography, has significant applications across diverse fields such as information security and distributed quantum computing. This paper proposes a d-dimensional hierarchical quantum multi-secret sharing scheme with… read more here.

Keywords: multi secret; quantum; sharing scheme; secret sharing ... See more keywords

Improvement and security analysis of multi-ring discrete modulation continuous variable quantum secret sharing scheme

Sign Up to like & get
recommendations!
Published in 2024 at "Chinese Physics B"

DOI: 10.1088/1674-1056/ad3b81

Abstract: In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring… read more here.

Keywords: multi ring; quantum; sharing scheme; discrete modulation ... See more keywords