2018
DOI: 10.29020/nybg.ejpam.v11i2.3250
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Secret sharing has been a subject of study since 1979. It is important that a secret key, passwords, information of the map of a secret place or an important formula must be keptsecret. The main problem is to divide the secret into pieces instead of storing the whole for a secret sharing. A secret sharing scheme is a way of distributing a secret among a nite set of people such that only some distinguished subsets of these subsets can recover the secret. The collection of these special subsets is called the acc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…In this section, we examine the application of some secret sharing schemes. We have worked a new approach to construct secret sharing schemes based on field extensions in [13]. In this paper, we generalise the results of [13].…”
Section: Proposed Methodsmentioning
confidence: 97%
See 3 more Smart Citations
“…In this section, we examine the application of some secret sharing schemes. We have worked a new approach to construct secret sharing schemes based on field extensions in [13]. In this paper, we generalise the results of [13].…”
Section: Proposed Methodsmentioning
confidence: 97%
“…(k -1) + (k -t)] th column in the i th row. The matrix P(x) is written as the elements of matrix T(x) by using Algorithm 1 [13].…”
Section: Proposed Schemementioning
confidence: 99%
See 2 more Smart Citations
“…After that Kabirirad et al [12] presented a (t, n) (t = 2) multi-secret image sharing based on Boolean operations and they provide experiments to show that their scheme is robust against statistical and differential attacks. In 2018, Molla et al [15] developed a new approach to construct a SSS based on field extensions. Later, Calkavur et al [6] construct an image SSS based on Shamir [19] secret sharing.…”
Section: Introductionmentioning
confidence: 99%