Two-tier authentication for cluster and individual sets in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Light-Weight e-Voting System with Distributed Trust
Electronic Notes in Theoretical Computer Science (ENTCS)
Generalized Mignotte's Sequences Over Polynomial Rings
Electronic Notes in Theoretical Computer Science (ENTCS)
General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting
Electronic Notes in Theoretical Computer Science (ENTCS)
Threshold cryptography based on Asmuth-Bloom secret sharing
Information Sciences: an International Journal
Non-admissible tracks in Shamir's scheme
Finite Fields and Their Applications
Lattice-based threshold-changeability for standard CRT secret-sharing schemes
Finite Fields and Their Applications
An efficient lattice-based secret sharing construction
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
A DCT multi-channel image information sharing scheme in resisting JPEG lossy compression attack
IScIDE'11 Proceedings of the Second Sino-foreign-interchange conference on Intelligent Science and Intelligent Data Engineering
Verifiable quantum (k, n)-threshold secret sharing
Quantum Information Processing
Lossless secret image sharing based on generalized: LSB replacement
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Secret image sharing scheme with adaptive authentication strength
Pattern Recognition Letters
Invertible secret image sharing for gray level and dithered cover images
Journal of Systems and Software
Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes
Information Sciences: an International Journal
Sharing DSS by the Chinese Remainder Theorem
Journal of Computational and Applied Mathematics
Information Processing Letters
Hi-index | 754.84 |
A method is proposed for a key safeguarding scheme (threshold scheme) in which the shadows are congruence classes of a number associated with the original key. A variation of this scheme provides efficient error detection and even exposes deliberate tampering. Certain underlying similarities of this scheme with Shamir's interpolation method make it possible to incorporate these protective features in that method as well.