Extending the representational state transfer (rest) architectural style for decentralized systems
Because it takes time and trust to establish agreement, traditional consensus-based
architectural styles cannot safely accommodate resources that change faster than it takes to …
architectural styles cannot safely accommodate resources that change faster than it takes to …
Threshold Key Management Scheme for Blockchain‐Based Intelligent Transportation Systems
Intelligent transportation systems (ITS) have always been an important application of Internet
of Things (IoT). Today, big data and cloud computing have further promoted the construction …
of Things (IoT). Today, big data and cloud computing have further promoted the construction …
A multisecret-sharing scheme based on LCD codes
Secret sharing is one of the most important cryptographic protocols. Secret sharing schemes
(SSS) have been created to that end. This protocol requires a dealer and several …
(SSS) have been created to that end. This protocol requires a dealer and several …
Assessment of two privacy preserving authentication methods using secure multiparty computation based on secret sharing
DE Fălămaş, K Marton, A Suciu - Symmetry, 2021 - mdpi.com
Secure authentication is an essential mechanism required by the vast majority of computer
systems and various applications in order to establish user identity. Credentials such as …
systems and various applications in order to establish user identity. Credentials such as …
Study on Secret Sharing Schemes (SSS) and their applications
Hiding a secret is needed in many situations. One might need to hide a password, an
encryption key, a secret recipe, and etc. Information can be secured with encryption, but the …
encryption key, a secret recipe, and etc. Information can be secured with encryption, but the …
Cascade forward back-propagation neural network based group authentication using (n, n) secret sharing scheme
Authentication is the important issue over the internet. It results in need of robust security
services and schemes. This paper proposes the Shamir Secret Sharing Scheme along with …
services and schemes. This paper proposes the Shamir Secret Sharing Scheme along with …
Overview of Blakley's Secret Sharing Scheme
A Shamsoshoara - arxiv preprint arxiv:1901.02802, 2019 - arxiv.org
In this report, I explained the problem of Secret Sharing Scheme. Then based on the
definition of the problem, two old methods: Blakley's Secret Sharing Scheme and Shamir's …
definition of the problem, two old methods: Blakley's Secret Sharing Scheme and Shamir's …
Game on: a performance comparison of interpolation techniques applied to Shamir's secret sharing
A Voudouris, A Tressos, A Zarras… - The Computer …, 2024 - academic.oup.com
Public-key encryption is typically managed through a public key infrastructure. However, it
relies on a central control point, the certification authority, which acts as a single point of …
relies on a central control point, the certification authority, which acts as a single point of …
[BUCH][B] Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory
The notion of secret sharing was independently introduced in 1979 by Shamir [36] and
Blakley [7]. A secret-sharing scheme (also called SSS) is a method by which one can …
Blakley [7]. A secret-sharing scheme (also called SSS) is a method by which one can …
[PDF][PDF] Shared cryptography with embedded session key for secret audio
In today's scenario many audio/voice files are needed to be transmitted over internet for
various important purposes. So protection of these files is an important issue. Efficient …
various important purposes. So protection of these files is an important issue. Efficient …