Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,728,530 papers from all fields of science
Search
Sign In
Create Free Account
Secret sharing
Known as:
Key splitting
, Threshold scheme
, Threshold shadow scheme
Expand
Secret sharing (also called secret splitting) refers to methods for distributing a secret amongst a group of participants, each of whom is allocated…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
Access structure
Adversary (cryptography)
All-or-nothing transform
Authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic
Maroti Deshmukh
,
N. Nain
,
Mushtaq Ahmed
International Conference on Advanced Information…
2016
Corpus ID: 14891606
Secret sharing scheme is an efficient method of transmitting one or more secret images securely. The traditional visual secret…
Expand
Highly Cited
2012
Highly Cited
2012
An improved energy detection scheme for cognitive radio networks in low SNR region
Ahmed S. B. Kozal
,
M. Merabti
,
F. Bouhafs
International Symposium on Computers and…
2012
Corpus ID: 9374703
Cognitive radio is considered as a new paradigm of designing wireless communication systems that aims at improving the spectrum…
Expand
2010
2010
Tamperproof transmission of fingerprints using visual cryptography schemes
Thomas Monoth
,
Babu Anto
Biometrics Technology
2010
Corpus ID: 18585028
2008
2008
Multi-secrets visual secret sharing
Tzungher Chen
,
K. Tsao
,
Chang-Sian Wu
Asia-Pacific Conference on Communications
2008
Corpus ID: 45096948
Visual secret sharing (VSS) is the well-known technique that encodes a secret image into several share images and, afterward…
Expand
Highly Cited
2007
Highly Cited
2007
A Direct Anonymous Attestation Scheme for Embedded Devices
H. Ge
,
S. Tate
International Conference on Theory and Practice…
2007
Corpus ID: 15100983
Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its…
Expand
Highly Cited
2002
Highly Cited
2002
Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing
Koutarou Suzuki
,
M. Yokoo
Financial Cryptography
2002
Corpus ID: 5868264
Combinatorial auctions have recently attracted the interests of many researchers due to their promising applications such as the…
Expand
Highly Cited
1998
Highly Cited
1998
Secret Sharing with Public Reconstruction
A. Beimel
,
B. Chor
IEEE Transactions on Information Theory
1998
Corpus ID: 17044888
All known constructions of information theoretic t-out-of-n secret-sharing schemes require secure, private communication channels…
Expand
1996
1996
An adaptive virtual path allocation policy for broadband networks
A. Orda
,
G. Pacifici
,
Dimitrios E. Pendarakis
Proceedings of IEEE INFOCOM '96. Conference on…
1996
Corpus ID: 14382779
We propose a new policy for virtual path bandwidth allocation in broadband networks. Based on a threshold scheme, our policy…
Expand
Highly Cited
1994
Highly Cited
1994
Determining the user locations for personal communications services networks
Yi-Bing Lin
1994
Corpus ID: 17305737
In a personal communications services system, it is required to locate the destination portable when an incoming call arrives…
Expand
Highly Cited
1992
Highly Cited
1992
Parallel reliable threshold multisignature
Y. Frankel
,
Y. Desmedt
1992
Corpus ID: 11543763
A multisignature scheme is developed here by combining the RSA signature scheme with Shamir's threshold scheme. This…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE