2020
DOI: 10.28991/esj-2020-01229 View full text |Buy / Rent full text
|
|

Abstract: Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some participants and a dealer. The dealer chooses a secret. The main principle is to distribute a secret amongst a group of participants. Each of whom is called a share of the secret. The secret can be retrieved by participants. Clearly the participants combine their shares to reach the secret. One of the secret sharing schemes is  threshold secret sharing scheme. A  threshold secret sharing scheme is a method of di… Show more

Help me understand this report

Search citation statements

Order By: Relevance
Select...
0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

0
2
0
Order By: Relevance
“…There are two kinds of algorithms that provide the conceptual basis for soft-decision decoding. One is to select the code word which minimizes the distance from the received sequence in order to minimize the block error probability [5,6]. The other is to decode each symbol in a code word in order to minimize the symbol error probability [7].…”
mentioning
See 1 more Smart Citation
Create an account to read the remaining citation statements from this report. You will also get access to:
  • Search over 1.2b+ citation statments to see what is being said about any topic in the research literature
  • Advanced Search to find publications that support or contrast your research
  • Citation reports and visualizations to easily see what publications are saying about each other
  • Browser extension to see Smart Citations wherever you read research
  • Dashboards to evaluate and keep track of groups of publications
  • Alerts to stay on top of citations as they happen
  • Automated reference checks to make sure you are citing reliable research in your manuscripts
  • 7 day free preview of our premium features.

Trusted by researchers and organizations around the world

Over 130,000 students researchers, and industry experts at use scite

See what students are saying

rupbmjkragerfmgwileyiopcupepmcmbcthiemesagefrontiersapsiucrarxivemeralduhksmucshluniversity-of-gavle
“…There are two kinds of algorithms that provide the conceptual basis for soft-decision decoding. One is to select the code word which minimizes the distance from the received sequence in order to minimize the block error probability [5,6]. The other is to decode each symbol in a code word in order to minimize the symbol error probability [7].…”
mentioning
“…In this paper, we shall investigate the former approach. The conventional algorithms have excellence in either error probability or decoding complexity [1, [4][5][6][7][8][9][10]. Zhang et al (2017) [11] proposed a feedback method combined with the low-density parity-check codes for building the wiretap channel.…”
mentioning