Extending the representational state transfer (rest) architectural style for decentralized systems

R Khare, RN Taylor - Proceedings. 26th International …, 2004 - ieeexplore.ieee.org
Because it takes time and trust to establish agreement, traditional consensus-based
architectural styles cannot safely accommodate resources that change faster than it takes to …

Threshold Key Management Scheme for Blockchain‐Based Intelligent Transportation Systems

T Zhou, J Shen, Y Ren, S Ji - Security and Communication …, 2021 - Wiley Online Library
Intelligent transportation systems (ITS) have always been an important application of Internet
of Things (IoT). Today, big data and cloud computing have further promoted the construction …

A multisecret-sharing scheme based on LCD codes

A Alahmadi, A Altassan, A AlKenani, S Çalkavur… - Mathematics, 2020 - mdpi.com
Secret sharing is one of the most important cryptographic protocols. Secret sharing schemes
(SSS) have been created to that end. This protocol requires a dealer and several …

Assessment of two privacy preserving authentication methods using secure multiparty computation based on secret sharing

DE Fălămaş, K Marton, A Suciu - Symmetry, 2021 - mdpi.com
Secure authentication is an essential mechanism required by the vast majority of computer
systems and various applications in order to establish user identity. Credentials such as …

Study on Secret Sharing Schemes (SSS) and their applications

N Al Ebri, J Baek, CY Yeun - 2011 International Conference for …, 2011 - ieeexplore.ieee.org
Hiding a secret is needed in many situations. One might need to hide a password, an
encryption key, a secret recipe, and etc. Information can be secured with encryption, but the …

Cascade forward back-propagation neural network based group authentication using (n, n) secret sharing scheme

S Narad, P Chavan - Procedia Computer Science, 2016 - Elsevier
Authentication is the important issue over the internet. It results in need of robust security
services and schemes. This paper proposes the Shamir Secret Sharing Scheme along with …

Overview of Blakley's Secret Sharing Scheme

A Shamsoshoara - arxiv preprint arxiv:1901.02802, 2019 - arxiv.org
In this report, I explained the problem of Secret Sharing Scheme. Then based on the
definition of the problem, two old methods: Blakley's Secret Sharing Scheme and Shamir's …

Game on: a performance comparison of interpolation techniques applied to Shamir's secret sharing

A Voudouris, A Tressos, A Zarras… - The Computer …, 2024 - academic.oup.com
Public-key encryption is typically managed through a public key infrastructure. However, it
relies on a central control point, the certification authority, which acts as a single point of …

[BUCH][B] Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory

S Çalkavur, A Bonnecaze, R dela Cruz, P Solé - 2022 - World Scientific
The notion of secret sharing was independently introduced in 1979 by Shamir [36] and
Blakley [7]. A secret-sharing scheme (also called SSS) is a method by which one can …

[PDF][PDF] Shared cryptography with embedded session key for secret audio

PK Naskar, HN Khan, U Roy, A Chaudhuri… - International Journal of …, 2011 - academia.edu
In today's scenario many audio/voice files are needed to be transmitted over internet for
various important purposes. So protection of these files is an important issue. Efficient …