Skip Content
You are currently on the new version of our website. Access the old version .

87 Results Found

  • Article
  • Open Access
5 Citations
2,160 Views
16 Pages

A Linear Algebraic Threshold Essential Secret Image Sharing Scheme

  • Mohammad Ghebleh,
  • Ali Kanso and
  • Abdullah Alazemi

26 February 2022

A secret sharing scheme allocates to each participant a share of a secret in such a way that authorized subsets of participants can reconstruct the secret, while shares of unauthorized subsets of participants provide no useful information about the s...

  • Article
  • Open Access
6 Citations
2,950 Views
20 Pages

A Novel Threshold Changeable Secret Image Sharing Scheme

  • Guohua Wu,
  • Mingyao Wang,
  • Qiuhua Wang,
  • Ye Yao,
  • Lifeng Yuan and
  • Gongxun Miao

7 February 2021

In secret image sharing, the image is divided into several stego images, which are managed by corresponding participants. The secret image can be recovered only when the number of authorized participants is no less than the threshold. Thus, it is wid...

  • Article
  • Open Access
4 Citations
1,974 Views
11 Pages

Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme

  • Qindong Sun,
  • Han Cao,
  • Shancang Li,
  • Houbing Song and
  • Yanxiao Liu

24 February 2022

Secret image sharing (SIS) is an important application of the traditional secret sharing scheme, which has become popular in recent years. In an SIS scheme, a confidential image is encrypted into a group of shadows. Any set of shadows that reaches th...

  • Feature Paper
  • Article
  • Open Access
4 Citations
7,391 Views
19 Pages

A (k, n)-Threshold Progressive Visual Secret Sharing without Expansion

  • Ying-Yu Chen,
  • Bo-Yuan Huang and
  • Justie Su-Tzu Juan

Visual cryptography (VC) encrypts a secret image into n shares (transparency). As such, we cannot see any information from any one share, and the original image is decrypted by stacking all of the shares. The general (k, n)-threshold secret sharing s...

  • Article
  • Open Access
15 Citations
2,576 Views
15 Pages

A Kind of (t, n) Threshold Quantum Secret Sharing with Identity Authentication

  • Depeng Meng,
  • Zhihui Li,
  • Shuangshuang Luo and
  • Zhaowei Han

22 May 2023

Quantum secret sharing (QSS) is an important branch of quantum cryptography. Identity authentication is a significant means to achieve information protection, which can effectively confirm the identity information of both communication parties. Due t...

  • Review
  • Open Access
6 Citations
7,649 Views
26 Pages

Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey

  • Jingyu Chen,
  • Haitao Deng,
  • Huachang Su,
  • Minghao Yuan and
  • Yongjun Ren

As the most popular cryptographic scheme in the post-quantum field, lattices have received extensive attention and research. Not only do they provide quantum-resistant security, they also enable the construction of complex applications. Currently, la...

  • Article
  • Open Access
4 Citations
2,359 Views
17 Pages

26 June 2024

To solve the limitations of reversible data hiding in encrypted domains (RDH-ED) that cannot be applied to a distributed variable security environment, a novel RDH-ED scheme based on variable threshold image secret sharing (VTSIS) is proposed. Initia...

  • Article
  • Open Access
5 Citations
2,731 Views
23 Pages

15 August 2024

In recent years, with the rapid development of blockchain technology, the issues of storage load and data security have attracted increasing attention. Due to the immutable nature of data on the blockchain, where data can only be added and not delete...

  • Article
  • Open Access
17 Citations
5,068 Views
14 Pages

19 October 2018

The Internet of Things (IoT) environment is constantly evolving. Many IoT services have emerged, improving living conditions. Smart homes were among the first developments, and smart buildings, smart factories, and smart cities are attracting increas...

  • Article
  • Open Access
40 Citations
2,698 Views
20 Pages

Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm

  • Pradeep Kumar,
  • Kakoli Banerjee,
  • Niraj Singhal,
  • Ajay Kumar,
  • Sita Rani,
  • Raman Kumar and
  • Cioca Adriana Lavinia

8 November 2022

A mobile agent is a software application that moves naturally among hosts in a uniform and non-uniform environment; it starts with one host and then moves onto the next in order to divide data between clients. The mobile paradigm is utilized in a wid...

  • Article
  • Open Access
9 Citations
3,748 Views
16 Pages

31 January 2023

Quantum secret sharing is an important branch of quantum cryptography, and secure multi-party quantum key distribution protocols can be constructed using quantum secret sharing. In this paper, we construct a quantum secret sharing scheme built on a c...

  • Article
  • Open Access
4 Citations
2,380 Views
29 Pages

23 February 2022

(k,n)-threshold secret image sharing (SIS) protects an image by dividing it into n shadow images. The secret image will be recovered as we gather k or more shadow images. In complex networks, the security, robustness and efficiency of protecting imag...

  • Article
  • Open Access
26 Citations
6,311 Views
25 Pages

3 January 2022

Many group key management protocols have been proposed to manage key generation and distribution of vehicular communication. However, most of them suffer from high communication and computation costs due to the complex elliptic curve and bilinear pai...

  • Article
  • Open Access
19 Citations
5,460 Views
15 Pages

14 December 2020

Blockchain systems store transaction data in the form of a distributed ledger where each node stores a copy of all data, which gives rise to storage issues. It is well-known that the tremendous storage and distribution of the block data are common pr...

  • Article
  • Open Access
3 Citations
2,574 Views
19 Pages

7 February 2022

Secret image sharing is a hot issue in the research field of data hiding schemes for digital images. This paper proposes a general k,n threshold secret image sharing scheme, which distributes secret data into n meaningful image shadows based on a non...

  • Feature Paper
  • Article
  • Open Access
6 Citations
2,477 Views
21 Pages

1 November 2021

The (k, n)-threshold reversible secret image sharing (RSIS) is technology that conceals the secret data in a cover image and produces n shadow versions. While k (k ≤ n) or more shadows are gathered, the embedded secret data and the cover im...

  • Proceeding Paper
  • Open Access
2 Citations
507 Views
10 Pages

As network demands increase, encryption becomes increasingly important. Visual secret sharing (VSS) encrypts a secret image into multiple images (called shares) and then superimposes these shares so that the original image can be directly identified...

  • Article
  • Open Access
15 Citations
3,598 Views
16 Pages

An Image Secret Sharing Method Based on Matrix Theory

  • Wanmeng Ding,
  • Kesheng Liu,
  • Xuehu Yan,
  • Huaixi Wang,
  • Lintao Liu and
  • Qinghong Gong

22 October 2018

Most of today’s secret image sharing technologies are based on the polynomial-based secret sharing scheme proposed by shamir. At present, researchers mostly focus on the development of properties such as small shadow size and lossless recovery,...

  • Article
  • Open Access
7 Citations
3,060 Views
17 Pages

Lossless and Efficient Secret Image Sharing Based on Matrix Theory Modulo 256

  • Long Yu,
  • Lintao Liu,
  • Zhe Xia,
  • Xuehu Yan and
  • Yuliang Lu

22 June 2020

Most of today’s secret image sharing (SIS) schemes are based on Shamir’s polynomial-based secret sharing (SS), which cannot recover pixels larger than 250. Many exiting methods of lossless recovery are not perfect, because several problem...

  • Article
  • Open Access
9 Citations
3,123 Views
18 Pages

Practical Secret Image Sharing Based on the Chinese Remainder Theorem

  • Longlong Li,
  • Yuliang Lu,
  • Lintao Liu,
  • Yuyuan Sun and
  • Jiayu Wang

7 June 2022

Compared with Shamir’s original secret image sharing (SIS), the Chinese-remainder-theorem-based SIS (CRTSIS) generally has the advantages of a lower computation complexity, lossless recovery and no auxiliary encryption. However, general CRTSIS...

  • Article
  • Open Access
2 Citations
1,673 Views
14 Pages

11 June 2022

Every t-dynamic proper n-coloring of a graph G describes a shadow allocation of any (n,t+1)-threshold secret sharing scheme based on G, so that, after just one round of communication, each participant can either reconstruct the secret, or obtain a di...

  • Article
  • Open Access
382 Views
20 Pages

Role-Based Efficient Proactive Secret Sharing with User Revocation

  • Yixuan He,
  • Yuta Kodera,
  • Yasuyuki Nogami and
  • Samsul Huda

Proactive secret sharing (PSS), an extension of secret-sharing schemes, safeguards sensitive data in dynamic distributed networks by periodically refreshing shares to counter adversarial attacks. In our previous work, we constructed a non-interactive...

  • Article
  • Open Access
3 Citations
5,786 Views
16 Pages

This paper presents a new threshold signature scheme based on Damgaard’s work. The proposed scheme allows for changing the message signature threshold, thereby improving the flexibility of the original Damgaard scheme. This scheme can be applie...

  • Article
  • Open Access
1 Citations
1,619 Views
18 Pages

Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks

  • Yongli Tang,
  • Menghao Guo,
  • Binyong Li,
  • Kaixin Geng,
  • Jinxia Yu and
  • Baodong Qin

26 December 2024

Currently, most quantum homomorphic encryption (QHE) schemes only allow a single evaluator (server) to accomplish computation tasks on encrypted data shared by the data owner (user). In addition, the quantum computing capability of the evaluator and...

  • Article
  • Open Access
770 Views
24 Pages

28 March 2025

In response to the issues of high transaction transparency and regulatory difficulties in blockchain account-model transactions, this paper presents a supervised blockchain anonymous transaction model based on certificateless signcryption aimed at en...

  • Article
  • Open Access
126 Views
15 Pages

23 January 2026

Visual secret sharing (VSS) schemes can enhance the security of image transmission over networks. Conventional VSS schemes often generate meaningless shares, which can raise suspicion among potential attackers. To address this issue, this paper propo...

  • Article
  • Open Access
1 Citations
1,860 Views
20 Pages

4 October 2024

Federated learning is a decentralized privacy-preserving mechanism that allows multiple clients to collaborate without exchanging their datasets. Instead, they jointly train a model by uploading their own gradients. However, recent research has shown...

  • Article
  • Open Access
8 Citations
2,634 Views
19 Pages

A Lightweight Secure Scheme for Underwater Wireless Acoustic Network

  • Jia Shi,
  • Jinqiu Wu,
  • Zhiwei Zhao,
  • Xiaofei Qi,
  • Wenbo Zhang,
  • Gang Qiao and
  • Dahong Zuo

Due to the open underwater channels and untransparent network deployment environments, underwater acoustic networks (UANs) are more vulnerable to hostile environments. Security research is also being conducted in cryptography, including authenticatio...

  • Proceeding Paper
  • Open Access
5 Citations
1,284 Views
11 Pages

7 December 2023

A (k, n) visual cryptography (VCS) is used to build a system for secret sharing. The system divides a secret image (S) into n shares and recovers S by stacking shares bigger than or equal to k, while shares below k provide no information about S. The...

  • Article
  • Open Access
2 Citations
2,389 Views
7 Pages

Secret Sharing, Zero Sum Sets, and Hamming Codes

  • Selda Çalkavur and
  • Patrick Solé

23 September 2020

A (t,n)-secret sharing scheme is a method of distribution of information among n participants such that any t>1 of them can reconstruct the secret but any t−1 cannot. A ramp secret sharing scheme is a relaxation of that protocol that allows...

  • Article
  • Open Access
3 Citations
2,631 Views
18 Pages

A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure

  • Irfan Alam,
  • Amal S. Alali,
  • Shakir Ali and
  • Muhammad S. M. Asri

30 July 2024

Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shar...

  • Article
  • Open Access
6 Citations
3,753 Views
15 Pages

XOR-Based Progressively Secret Image Sharing

  • Cheng-Shian Lin,
  • Chien-Chang Chen and
  • Yu-Cheng Chen

12 March 2021

Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily. However, how to recover secret images with progressive steps is not...

  • Article
  • Open Access
70 Citations
4,614 Views
12 Pages

19 March 2020

With the spread of the Internet, the speed of data spread is getting faster and faster. It benefits us a lot but also brings us many potential security problems, especially the problem of privacy leakage. For example, more and more people choose to s...

  • Feature Paper
  • Article
  • Open Access
997 Views
18 Pages

Implementing Quantum Secret Sharing on Current Hardware

  • Jay Graves,
  • Mike Nelson and
  • Eric Chitambar

23 September 2025

Quantum secret sharing is a cryptographic scheme that enables the secure storage and reconstruction of quantum information. While the theory of secret sharing is mature in its development, relatively few studies have explored the performance of quant...

  • Article
  • Open Access
38 Citations
4,128 Views
16 Pages

Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size

  • Xuan Zhou,
  • Yuliang Lu,
  • Xuehu Yan,
  • Yongjie Wang and
  • Lintao Liu

1 July 2018

Thien-and-Lin’s polynomial-based secret image sharing (PSIS) is utilized as the basic method to achieve PSISs with better performances, such as meaningful shares, two-in-one property and shares with different priorities. However, this (k,n) thr...

  • Article
  • Open Access
5 Citations
3,246 Views
18 Pages

9 March 2022

The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number. However, traditional image secret sharing schemes generally reuse the Lagrange’s inter...

  • Article
  • Open Access
4 Citations
2,834 Views
21 Pages

Boolean-Based (k, n, m) Multi-Secret Image Sharing

  • Chien-Chang Chen,
  • Cheng-Shian Lin and
  • Jia-Zhan Chen

23 April 2022

Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property. Simultaneously, the adopted Boolean method preserves high pe...

  • Article
  • Open Access
18 Citations
7,837 Views
11 Pages

A New Visual Multi-Secrets Sharing Scheme by Random Grids

  • Joy Jo-Yi Chang,
  • Bo-Yuan Huang and
  • Justie Su-Tzu Juan

In (2, 2)-visual secret sharing (VSS) schemes, a common type of (k, n)-threshold VSS schemes, secret information can be decoded directly through only two shares by using a human vision system. Several studies have analyzed methods of simplifying the...

  • Article
  • Open Access
1,044 Views
11 Pages

29 February 2024

Threshold schemes are used among cryptographic techniques for splitting visual data. Such methods allow the generation of a number of secret shares, a certain number of which need to be assembled in order to reconstruct the original image. Traditiona...

  • Article
  • Open Access
4 Citations
1,555 Views
20 Pages

Secret sharing is a data security technique that divides secret information into multiple parts, embeds these parts into various shares, and distributes these shares to different participants. The original secret information can be retrieved only whe...

  • Article
  • Open Access
63 Citations
5,506 Views
11 Pages

Intelligent Data Management and Security in Cloud Computing

  • Lidia Ogiela,
  • Marek R. Ogiela and
  • Hoon Ko

18 June 2020

This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedica...

  • Article
  • Open Access
1,731 Views
30 Pages

24 April 2025

Threshold multi-party fully homomorphic encryption (TMFHE) schemes enable efficient computation to be performed on sensitive data while maintaining privacy. These schemes allow a subset of parties to perform threshold decryption of evaluation results...

  • Article
  • Open Access
316 Views
17 Pages

1 December 2025

With the rapid advancement of technology, data transmission security has become an increasingly critical issue. Visual Cryptography Scheme (VCS) provides a secure method for sharing secret images without complex computation—by stacking multiple...

  • Article
  • Open Access
17 Citations
3,002 Views
20 Pages

12 February 2020

A ( k , n ) threshold secret image sharing (SIS) method is proposed to divide a secret image into n shadows. The beauty of this scheme is that one can only reconstruct a secret image with k or more than k shadows, but one cannot obtain any in...

  • Article
  • Open Access
1,479 Views
11 Pages

12 April 2023

This paper defines new classes of algorithms for securing and sharing visual information. Algorithms offering data protection against unauthorised access are cryptographic protocols for data sharing and splitting. These protocols ensure the division...

  • Article
  • Open Access
13 Citations
4,729 Views
20 Pages

1 November 2019

Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc. Recently, researches have indicated that com...

  • Article
  • Open Access
2 Citations
2,602 Views
20 Pages

21 September 2023

Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a shar...

  • Article
  • Open Access
11 Citations
3,731 Views
14 Pages

6 August 2021

In recent years, blockchain has triggered an upsurge in the application of decentralized models and has received more and more attention. For convenience and security considerations, in blockchain applications, users usually use wallets to manage dig...

  • Article
  • Open Access
7 Citations
2,291 Views
13 Pages

25 September 2022

Image-based data hiding methods have been used in the development of various applications in computer vision. At present, there are two main types of data hiding based on secret sharing, namely dual-image data hiding and multi-image data hiding. Dual...

of 2