In some particular situations, participants need to recover different secrets both within a group (i.e., intragroup) and between two groups (i.e., intergroup). However, most of the existing multilevel secret sharing (MLSS) and multigroup secret sharing (MGSS) schemes mainly focus on how to protect a secret between one or more groups. In this paper, we propose a polynomial-based scheme to share multiple secret images both within a group and between groups. The random elements’ utilization model of integer linear programming is used to find polynomial coefficients that meet certain conditions so that each participant holds only one shadow image and some of them can recover secrets of both intergroup and intragroup. In addition, our scheme bas...
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, th...
Now a days exploring and analyzing or mining data in various ways give insights into future for inve...
A new grayscale image encryption algorithm based on , threshold secret sharing is proposed. The sch...
Thien-and-Lin’s polynomial-based secret image sharing (PSIS) is utilized as the basic method t...
In some particular scenes, the shadows need to be given different weights to represent the participa...
[[abstract]]In traditional secret sharing schemes for general access structures, a secret can be en...
Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1,...
A Secret sharing scheme is a method for dividing a secret into several partial information. The secr...
A $(t,n)$-threshold secret sharing scheme is a method to distribute a secret among $n$ participants ...
Secret sharing scheme is an efficient method to hide secret key or secret image by partitioning it i...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
[[abstract]]This paper presents a two-layered structure for optimally sharing a secret image among s...
Most of today’s secret image sharing technologies are based on the polynomial-based secret sha...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, th...
Now a days exploring and analyzing or mining data in various ways give insights into future for inve...
A new grayscale image encryption algorithm based on , threshold secret sharing is proposed. The sch...
Thien-and-Lin’s polynomial-based secret image sharing (PSIS) is utilized as the basic method t...
In some particular scenes, the shadows need to be given different weights to represent the participa...
[[abstract]]In traditional secret sharing schemes for general access structures, a secret can be en...
Secret sharing • Method for dividing a secret S into n pieces of information (shares or shadows) s1,...
A Secret sharing scheme is a method for dividing a secret into several partial information. The secr...
A $(t,n)$-threshold secret sharing scheme is a method to distribute a secret among $n$ participants ...
Secret sharing scheme is an efficient method to hide secret key or secret image by partitioning it i...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
[[abstract]]This paper presents a two-layered structure for optimally sharing a secret image among s...
Most of today’s secret image sharing technologies are based on the polynomial-based secret sha...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, th...
Now a days exploring and analyzing or mining data in various ways give insights into future for inve...
A new grayscale image encryption algorithm based on , threshold secret sharing is proposed. The sch...