2020
DOI: 10.28991/esj-2020-01229
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Multisecret-Sharing Schemes Based on Linear Codes

Abstract: Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some participants and a dealer. The dealer chooses a secret. The main principle is to distribute a secret amongst a group of participants. Each of whom is called a share of the secret. The secret can be retrieved by participants. Clearly the participants combine their shares to reach the secret. One of the secret sharing schemes is  threshold secret sharing scheme. A  threshold secret sharing scheme is a method of di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…There are two kinds of algorithms that provide the conceptual basis for soft-decision decoding. One is to select the code word which minimizes the distance from the received sequence in order to minimize the block error probability [5,6]. The other is to decode each symbol in a code word in order to minimize the symbol error probability [7].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…There are two kinds of algorithms that provide the conceptual basis for soft-decision decoding. One is to select the code word which minimizes the distance from the received sequence in order to minimize the block error probability [5,6]. The other is to decode each symbol in a code word in order to minimize the symbol error probability [7].…”
mentioning
confidence: 99%
“…In this paper, we shall investigate the former approach. The conventional algorithms have excellence in either error probability or decoding complexity [1, [4][5][6][7][8][9][10]. Zhang et al (2017) [11] proposed a feedback method combined with the low-density parity-check codes for building the wiretap channel.…”
mentioning
confidence: 99%