A verifiable multi-secret sharing scheme based on cellular automata
From MaRDI portal
Publication:991230
DOI10.1016/j.ins.2010.04.015zbMath1193.94070OpenAlexW2094237742MaRDI QIDQ991230
Publication date: 2 September 2010
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2010.04.015
cellular automatadiscrete logarithm problemcryptographic protocolsecret sharing schemesecret image sharing
Cellular automata (computational aspects) (68Q80) Authentication, digital signatures and secret sharing (94A62)
Related Items
A non-interactive \((t, n)\)-publicly verifiable multi-secret sharing scheme ⋮ A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction ⋮ A search for good pseudo-random number generators: survey and empirical studies ⋮ Robust consensus tracking control for switched multiple Lagrangian systems by UDE-based control method ⋮ Verifiable multi-secret sharing based on LFSR sequences ⋮ Image encryption scheme based on balanced two-dimensional cellular automata ⋮ A verifiable threshold secret sharing scheme based on lattices ⋮ Efficient verifiable multi-secret sharing scheme based on hash function ⋮ Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem ⋮ An ideal multi-secret sharing scheme based on MSP
Cites Work
- Unnamed Item
- Secret image sharing based on cellular automata and steganography
- Invertible cellular automata: A review
- A multisecret sharing scheme for color images based on cellular automata
- Reversible cellular automata with memory: two-dimensional patterns from a single site seed
- New efficient and practical verifiable multi-secret sharing schemes
- A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme
- A secret sharing scheme based on cellular automata
- How to share a secret