On Multiple Encryption for Public-Key Cryptography

T Soroceanu, N Buchmann, M Margraf - Cryptography, 2023 - mdpi.com
Using multiple, individual encryption schemes is a well-established method to increase the
overall security of encrypted data. These so-called multiple encryption or hybrid schemes …

Efficient secret sharing schemes achieving optimal information rate

Y Wang, Y Desmedt - 2014 IEEE Information Theory Workshop …, 2014 - ieeexplore.ieee.org
One of the important problems in secret sharing schemes is to establish bounds on the size
of the shares to be given to participants in secret sharing schemes. The other important …

Efficient, XOR-based, ideal threshold schemes

L Chen, TM Laing, KM Martin - International Conference on Cryptology …, 2016 - Springer
We propose a new, lightweight (t, n)-threshold secret sharing scheme that can be
implemented using only XOR operations. Our scheme is based on an idea extracted from a …

Adding features of educational games for teaching Physics

K Muñoz, J Noguez, P Mc Kevitt, L Neri… - 2009 39th IEEE …, 2009 - ieeexplore.ieee.org
Virtual laboratories (VLs) have to overcome important challenges to improve student
knowledge, understanding and motivation. This research aims to test the hypothesis that …

Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains

K Toyoda, I Sasase - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
Recently, a secret sharing scheme is found to be effective to solve the key distribution
problem between parties in RFID-enabled supply chains. However, there is a problem that …

Cryptanalysis and improvement of a group RFID authentication protocol

N Pakniat, Z Eslami - Wireless Networks, 2020 - Springer
In recent years, radio frequency identification (RFID) systems have become popular for
identification. The key technology to protect the security of RFID systems is mutual …

New proof techniques using the properties of circulant matrices for XOR-based (k, n) threshold secret sharing schemes

K Shima, H Doi - Journal of Information Processing, 2021 - jstage.jst.go.jp
Several secret sharing schemes with low computational costs have been proposed. XOR-
based secret sharing schemes have been reported to be a part of such low-cost schemes …

A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function

A Al-Adhami, M Ambroze, I Stengel… - … on Ubiquitous and …, 2017 - ieeexplore.ieee.org
The applications of using multi-tag RFID technology have rapidly grown to be used in
different fields of life. However, security and privacy are the main issues with this technology …

A Quorum System for Distributing RFID Tags

A Al-Adhami, M Ambroze, I Stengel… - 2016 Intl IEEE …, 2016 - ieeexplore.ieee.org
Recently, the applications of radio frequency identification (RFID) technology have been
increasingly used in various fields that need automatic identification. RFID is an alternative …

Practical key distribution scheme with less dummy tags in RFID-enabled supply chains

T Sato, K Toyoda, I Sasase - 2016 22nd Asia-Pacific …, 2016 - ieeexplore.ieee.org
In RFID-enabled supply chains, in order to securely deliver products, a secret sharing
scheme has been proposed. An encryption key of tags is split into shares and the key can be …