Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A verifiable secret sharing scheme with combiner verification and cheater identification
In threshold secret sharing (SS) scheme, widely known as (k, n) threshold secret sharing, a
secret S is divided into n shares and distributed to participants by a dealer in such a way that …
secret S is divided into n shares and distributed to participants by a dealer in such a way that …
An efficient verifiable threshold multi-secret sharing scheme with different stages
D Chen, W Lu, W **ng, N Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Secret sharing is one of the most important cryptographic primitives used for data
outsourcing. The threshold-based secret sharing scheme is one of the well-known secret …
outsourcing. The threshold-based secret sharing scheme is one of the well-known secret …
Threshold Key Management Scheme for Blockchain‐Based Intelligent Transportation Systems
Intelligent transportation systems (ITS) have always been an important application of Internet
of Things (IoT). Today, big data and cloud computing have further promoted the construction …
of Things (IoT). Today, big data and cloud computing have further promoted the construction …
[HTML][HTML] Threshold-based post-quantum secure verifiable multi-secret sharing for distributed storage blockchain
Blockchain systems store transaction data in the form of a distributed ledger where each
node stores a copy of all data, which gives rise to storage issues. It is well-known that the …
node stores a copy of all data, which gives rise to storage issues. It is well-known that the …
[PDF][PDF] A Secure Framework for Blockchain Transactions Protection.
WN Al-Sharu, MK Qabalin, M Naser… - Comput. Syst. Sci …, 2023 - researchgate.net
One of the most extensively used technologies for improving the security of IoT devices is
blockchain technology. It is a new technology that can be utilized to boost the security. It is a …
blockchain technology. It is a new technology that can be utilized to boost the security. It is a …
Key escrow protocol based on a tripartite authenticated key agreement and threshold cryptography
Z Wang, Z Ma, S Luo, H Gao - IEEE Access, 2019 - ieeexplore.ieee.org
While instant messaging systems bring convenience to people's lives and work, they also
make it easier for malicious users to discuss and plot illegal activities. Therefore …
make it easier for malicious users to discuss and plot illegal activities. Therefore …
[HTML][HTML] Homomorphic extensions of CRT-based secret sharing
In this work, we explore the homomorphic aspect of CRT-based secret sharing schemes.
Secret sharing homomorphism is the notion of operating on multiple secrets by direct …
Secret sharing homomorphism is the notion of operating on multiple secrets by direct …
On modular (CRT-based) secret sharing
NN Shenets - Journal of Computer Virology and Hacking Techniques, 2024 - Springer
Secret sharing scheme (SSS) allows to share some secret s among n parties in such a way
that only certain subsets of them can recover the secret. The first SSSs were independently …
that only certain subsets of them can recover the secret. The first SSSs were independently …
Multilevel threshold secret sharing based on the Chinese remainder theorem
In multilevel secret sharing, a secret is shared among a set of hierarchically organized
participants in a way that the members of the superior compartments are more powerful and …
participants in a way that the members of the superior compartments are more powerful and …
[PDF][PDF] A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network
M Zanab, H Ashraf, NZ Jhanjhi - 2023 - preprints.org
Due to the advancement and availability of internet in present age, device tend to become
wireless as well. Mobile ad-hoc network is a wireless environment that consist of advanced …
wireless as well. Mobile ad-hoc network is a wireless environment that consist of advanced …