The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.1109/tii.2015.2514097
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
51
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 72 publications
(52 citation statements)
references
References 10 publications
0
51
0
1
Order By: Relevance
“…Figure 2 , if 7 · y mod 8 = 0; 7·y+8−7·y mod 8 8 , if 7 · y mod 8 = 0. An identification (ID) sequence is generated using the SHA-256 hash function over the k bytes and generates a 64 hexadecimal string [12]. This ID works as storage address for further redundancy retrieval.…”
Section: Meaningless Reversible Degradationmentioning
confidence: 99%
“…Figure 2 , if 7 · y mod 8 = 0; 7·y+8−7·y mod 8 8 , if 7 · y mod 8 = 0. An identification (ID) sequence is generated using the SHA-256 hash function over the k bytes and generates a 64 hexadecimal string [12]. This ID works as storage address for further redundancy retrieval.…”
Section: Meaningless Reversible Degradationmentioning
confidence: 99%
“…The use of QR codes in information security has been proposed for a variety of different purposes, such as for authenticating visual cryptography shares [22], e-voting authentication [23], digital watermarking [24], data hiding [7] and secret sharing [10,12,13]. This section presents several studies that are related to the work in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…A distributed secret sharing approach using QR codes was proposed by Lin [13]. This approach is an (n, n) secret sharing scheme, where a secret is split into shares and encrypted before concealing them within marked QR codes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To enhance system security, Lin [13] exploited the QR code error correction capacity by proposing an ( , ) n n -threshold secret sharing scheme. Lin's scheme employed the technology of wet paper code [14] to randomly embed both the secret share and authentication message in cover QR codes.…”
Section: Introductionmentioning
confidence: 99%