2020 **Abstract:** Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some participants and a dealer. The dealer chooses a secret. The main principle is to distribute a secret amongst a group of participants. Each of whom is called a share of the secret. The secret can be retrieved by participants. Clearly the participants combine their shares to reach the secret. One of the secret sharing schemes is threshold secret sharing scheme. A threshold secret sharing scheme is a method of di…

Help me understand this report

Search citation statements

Select...

0

2

0

Year Published

2020

2020

Publication Types

Select...

1

Relationship

0

1

Authors

Journals

0

2

0

“…There are two kinds of algorithms that provide the conceptual basis for soft-decision decoding. One is to select the code word which minimizes the distance from the received sequence in order to minimize the block error probability [5,6]. The other is to decode each symbol in a code word in order to minimize the symbol error probability [7].…”

mentioning

- Search over 1.2b+ citation statments to see what is being said about any topic in the research literature
- Advanced Search to find publications that support or contrast your research
- Citation reports and visualizations to easily see what publications are saying about each other
- Browser extension to see Smart Citations wherever you read research
- Dashboards to evaluate and keep track of groups of publications
- Alerts to stay on top of citations as they happen
- Automated reference checks to make sure you are citing reliable research in your manuscripts
**7 day free preview of our premium features.**

Over 130,000 students researchers, and industry experts at use scite

See what students are saying

“…There are two kinds of algorithms that provide the conceptual basis for soft-decision decoding. One is to select the code word which minimizes the distance from the received sequence in order to minimize the block error probability [5,6]. The other is to decode each symbol in a code word in order to minimize the symbol error probability [7].…”

mentioning

“…In this paper, we shall investigate the former approach. The conventional algorithms have excellence in either error probability or decoding complexity [1, [4][5][6][7][8][9][10]. Zhang et al (2017) [11] proposed a feedback method combined with the low-density parity-check codes for building the wiretap channel.…”

mentioning