Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Massoud Hadian Dehkordi"'
Publikováno v:
CAAI Transactions on Intelligence Technology, Vol 9, Iss 2, Pp 388-410 (2024)
Abstract In traditional secret image sharing schemes, a secret image is shared among shareholders who have the same position. But if the shareholders have two different positions, essential and non‐essential, it is necessary to use essential secret
Externí odkaz:
https://doaj.org/article/9e657714cc3f4ccab649fafa96eee3ab
Publikováno v:
IET Image Processing, Vol 18, Iss 4, Pp 1053-1072 (2024)
Abstract In traditional secret image sharing schemes, shareholders have similar situations, and to recover the secret image, they must be present as many as the threshold. However, in scenarios where the shareholders occupy different positions, essen
Externí odkaz:
https://doaj.org/article/cd5bb858306044fba5902d0bf771a1a8
Publikováno v:
International Journal of Industrial Engineering and Production Research, Vol 19, Iss 1, Pp 13-16 (2008)
Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stac
Externí odkaz:
https://doaj.org/article/c202901cba574472bff05384a0c67070
Autor:
Ebad Mirzaei, Massoud Hadian Dehkordi
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 13:3903-3921
Autor:
Massoud Hadian Dehkordi, Samaneh Mashhadi, Seyed Taghi Farahi, Mohommad Hosein Noorallahzadeh
In threshold secret image sharing (t, n) schemes, each of n shareholders has a share of secret image S. By having at least t shares, the dealer D can retrieve the secret image S. In such traditional secret image sharing schemes, there is no ability t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::01cc9623ab3a99cce6793a52c29cb4f5
https://doi.org/10.21203/rs.3.rs-2199872/v1
https://doi.org/10.21203/rs.3.rs-2199872/v1
Autor:
Massoud Hadian Dehkordi, Hossein Oraei
Publikováno v:
IET Information Security. 13:343-351
In a verifiable multi-secret sharing scheme, a dealer distributes multiple secrets between a group of participants and also additional information is given that allows each participant to check whether his share is valid. In this study, the authors p
Publikováno v:
Wireless Personal Communications. 104:491-503
In proactive secret sharing schemes, the secret shares are periodically renewed without modifying the secret such that an adversary is unable to get any information about the secret shares unless he is able to obtain a certain number of secret shares
Autor:
Massoud Hadian Dehkordi, Ali Amerimehr
Publikováno v:
IEEE Communications Letters. 22:1746-1749
A quantum cryptosystem based on algebraic codes, which uses single photons as quantum message carriers, is given. The cryptosystem is equipped with authentication, data integrity, and non-repudiation. There is no need for a parallel classical channel
Publikováno v:
International Journal of Cyber-Security and Digital Forensics. 7:183-188
Publikováno v:
IET Information Security. 11:326-331
In multi-secret sharing (MSS) scheme, a dealer distributes multiple secrets among a set of participants, each of them according to an access structure. In this study, the authors propose a novel linear MSS with computational verifiability that provid