Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,935,570 papers from all fields of science
Search
Sign In
Create Free Account
Secret sharing
Known as:
Key splitting
, Threshold scheme
, Threshold shadow scheme
Expand
Secret sharing (also called secret splitting) refers to methods for distributing a secret amongst a group of participants, each of whom is allocated…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
Access structure
Adversary (cryptography)
All-or-nothing transform
Authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
ECBK: Enhanced Cluster Based Key Management Scheme for Achieving Quality of Service
Y. H. Robinson
,
S. Balaji
,
M. Rajaram
2016
Corpus ID: 43992555
Wireless sensor networks consist of many small nodes with distributing devices to monitor conditions at different locations…
Expand
2009
2009
Robust Location Tag Generation from Noisy Location Data for Security Applications
D. Qiu
,
D. Boneh
,
S. Lo
,
P. Enge
2009
Corpus ID: 17060446
Location-based security service provides authorization of persons or facilities based on their distinctive location information…
Expand
2007
2007
A New Dynamic Threshold Secret Sharing Scheme from Bilinear Maps
Chen Wei
,
Long Xiang
,
Bai Yuebin
,
Gao Xiaopeng
International Conference on Parallel Processing…
2007
Corpus ID: 18003596
In a (t, n) threshold secret sharing scheme, any t- out-of-n participants could recover the shared secret, and any less than t…
Expand
Highly Cited
2004
Highly Cited
2004
Contrast-based color image segmentation
Hsin-Chia Chen
,
Wei-Jung Chien
,
Sheng-Jyh Wang
IEEE Signal Processing Letters
2004
Corpus ID: 5653886
In this letter, we propose a color image segmentation algorithm based on contrast information. Given a color image, we use…
Expand
2004
2004
Secret sharing with access structures in a hierarchy
Chinchen Chang
,
Chu-Hsing Lin
,
Wei Lee
,
Pai-Cheng Hwang
18th International Conference on Advanced…
2004
Corpus ID: 5909608
We propose a secret sharing scheme with the property of access structures in a hierarchy. We employ the concept of admission…
Expand
2000
2000
The Knowledge Depot: Building and Evaluating a Knowledge Management System
Beatrix Zimmermann
,
M. Atwood
,
Stefan Webb
,
M. Kantor
J. Educ. Technol. Soc.
2000
Corpus ID: 7905450
Organizations have long had the need to record and protect the knowledge that is their intellectual capital. However, the primary…
Expand
1998
1998
Faster learning of control parameters through sharing experiences of autonomous mobile robots
I. Kelly
,
D. Keating
International Journal of Systems Science
1998
Corpus ID: 1088130
This paper describes a learning algorithm for small autonomous mobile robots based on sets of fuzzy automata. The task of the…
Expand
1998
1998
Perfect Secret Sharing Schemes from Room Squares
G. Chaudhry
,
Hossein Ghodosi
,
J. Seberry
1998
Corpus ID: 16447009
Secret sharing schemes are one of the most important primitives in distributed systems. In perfect secret sharing schemes…
Expand
1983
1983
Secret Sharing Systems
S. Harari
1983
Corpus ID: 59648827
All through this paper the notion of secret that we will discuss is a notion linked to the use of a digital quantity called “key…
Expand
1978
1978
Group random-access disciplines for multi-access broadcast channels
I. Rubin
IEEE Transactions on Information Theory
1978
Corpus ID: 36763759
A group random-access (GILA) control discipline for a multi-access communication channel is presented and studied. A GILA scheme…
Expand