2014
DOI: 10.11591/telkomnika.v12i6.5483
|View full text |Cite
|
Sign up to set email alerts
|

Improved Multi-secret Sharing Scheme Based on One-Way Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…p2p network is a decentralized network in which each peer acts as both client and server, which makes it more applicable on emerging systems that consist mostly of mobile nodes. p2p network is also widely used in different applications such as secure chatting, distributed cash system [13], distributed data sharing [4] and distributed secret sharing [9] [18]. The open nature of p2p networks and the ability of almost everyone to join the network make some systems such as [8] to use a private overlay at p2p networks called friendto-friend (f2f) network as their underlying communication scheme to ensure secrecy and anonymity of participants beyond direct peer nodes [6].…”
Section: Introductionmentioning
confidence: 99%
“…p2p network is a decentralized network in which each peer acts as both client and server, which makes it more applicable on emerging systems that consist mostly of mobile nodes. p2p network is also widely used in different applications such as secure chatting, distributed cash system [13], distributed data sharing [4] and distributed secret sharing [9] [18]. The open nature of p2p networks and the ability of almost everyone to join the network make some systems such as [8] to use a private overlay at p2p networks called friendto-friend (f2f) network as their underlying communication scheme to ensure secrecy and anonymity of participants beyond direct peer nodes [6].…”
Section: Introductionmentioning
confidence: 99%
“…secret sharing, secret splitting, and visual cryptography can be implemented to solve this problem [2]- [3]. The secret splitting and secret sharing protocols can be applied to transform a message into several cipher-text segments that can be distributed to n people [4]. In secret splitting protocols, n cipher-text are required to recover the original message.…”
Section: Introductionmentioning
confidence: 99%