Skip to search formSkip to main contentSkip to account menu

Secret sharing

Known as: Key splitting, Threshold scheme, Threshold shadow scheme 
Secret sharing (also called secret splitting) refers to methods for distributing a secret amongst a group of participants, each of whom is allocated… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Secret sharing scheme is an efficient method of transmitting one or more secret images securely. The traditional visual secret… 
Highly Cited
2012
Highly Cited
2012
Cognitive radio is considered as a new paradigm of designing wireless communication systems that aims at improving the spectrum… 
2008
2008
Visual secret sharing (VSS) is the well-known technique that encodes a secret image into several share images and, afterward… 
Highly Cited
2007
Highly Cited
2007
Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its… 
Highly Cited
2002
Highly Cited
2002
Combinatorial auctions have recently attracted the interests of many researchers due to their promising applications such as the… 
Highly Cited
1998
Highly Cited
1998
All known constructions of information theoretic t-out-of-n secret-sharing schemes require secure, private communication channels… 
1996
1996
We propose a new policy for virtual path bandwidth allocation in broadband networks. Based on a threshold scheme, our policy… 
Highly Cited
1994
Highly Cited
1994
In a personal communications services system, it is required to locate the destination portable when an incoming call arrives… 
Highly Cited
1992
Highly Cited
1992
A multisignature scheme is developed here by combining the RSA signature scheme with Shamir's threshold scheme. This…