2017 International Conference on Computing, Communication and Automation (ICCCA) 2017
DOI: 10.1109/ccaa.2017.8229863
|View full text |Cite
|
Sign up to set email alerts
|

Multi-stage multi-secret sharing scheme for hierarchical access structure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…• It aspires to the ideal situation in which each token holder has the same priority or participation in the secret reconstruction phase. Several pieces of literature to overcome the drawbacks of Shamir's secret sharing schemes [31]- [33] for multi-stage and multiple secret sharing schemes. Similarly, others are used to verify the participant's tokens [34].…”
Section: A the (T N) Threshold Scheme Of Shamirmentioning
confidence: 99%
“…• It aspires to the ideal situation in which each token holder has the same priority or participation in the secret reconstruction phase. Several pieces of literature to overcome the drawbacks of Shamir's secret sharing schemes [31]- [33] for multi-stage and multiple secret sharing schemes. Similarly, others are used to verify the participant's tokens [34].…”
Section: A the (T N) Threshold Scheme Of Shamirmentioning
confidence: 99%
“…In 2015, Chanu et al [10] used Two variable one-way functions to verify the correctness of the received share. Further, in 2017, Basit et al [4] used Shamir's scheme with the successive application of one-way function and shifted and key technique to propose Multi-stage, Multi-secret sharing for hierarchical Access Structure. Apart from the above papers, the Hierarchical secret sharing (HSSS) scheme are discussed in [3,4,10,17,28,29,47], but his scheme lacks fairness.…”
Section: Introductionmentioning
confidence: 99%
“…This idea has since been continuously improved. [14][15][16][17][18][19] In response to the verifiability of participant identity and shadow, researchers also proposed a verifiable ISS on the polynomial-based ISS [20][21][22][23]. In 2017, Adnan Gutub et al proposed a counting-based secret sharing technique for multimedia applications [24].…”
Section: Introductionmentioning
confidence: 99%
“…A simple way to implement Lagrange's interpolation and construct the polynomial is by solving a linear system of equations. Many researchers just simply adopted this method in the revealing process of the SIS scheme [1][2][3]5,8,[10][11][12]16,17,19,22,23]. In practice, many secret image pixels and a large amount of data require solving many linear systems until all pixels are recovered.…”
Section: Introductionmentioning
confidence: 99%