A Study on Multisecret-Sharing Schemes Based on Linear Codes
Abstract
Keywords
References
Blakley, G. R. “Safeguarding Cryptographic Keys.” 1979 International Workshop on Managing Requirements Knowledge (MARK) (June 1979). doi:10.1109/mark.1979.8817296.
Shamir, Adi. “How to Share a Secret.” Communications of the ACM 22, no. 11 (November 1, 1979): 612–613. doi:10.1145/359168.359176.
Stinson, D. R. “An Explication of Secret Sharing Schemes.” Designs, Codes and Cryptography 2, no. 4 (December 1992): 357–390. doi:10.1007/bf00125203.
McEliece, R. J., and D. V. Sarwate. “On Sharing Secrets and Reed-Solomon Codes.” Communications of the ACM 24, no. 9 (September 1, 1981): 583–584. doi:10.1145/358746.358762.
Massey, James L. "Minimal codewords and secret sharing." In Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory, (1993): 276-279.
Dougherty, Steven T., Sihem Mesnager, and Patrick Sole. “Secret-Sharing Schemes Based on Self-Dual Codes.” 2008 IEEE Information Theory Workshop (May 2008). doi:10.1109/itw.2008.4578681.
Harn, L. "Comment on" Multistage secret sharing based on one-way function"." Electronics Letters 31, no. 4 (1995): 262. doi:10.1049/el:19950201.
He, Jingmin, and Edward Dawson. "Multistage secret sharing based on one-way function." Electronics Letters 30, no. 19 (1994): 1591-1592. doi:10.1049/el:19941076.
Li, HuiXian, ChunTian Cheng, and LiaoJun Pang. “A New (t, N)-Threshold Multi-Secret Sharing Scheme.” Lecture Notes in Computer Science (2005): 421–426. doi:10.1007/11596981_61.
Pang, Liao-Jun, and Yu-Min Wang. “A New (t,n) Multi-Secret Sharing Scheme Based on Shamir’s Secret Sharing.” Applied Mathematics and Computation 167, no. 2 (August 2005): 840–848. doi:10.1016/j.amc.2004.06.120.
Bai, Li. “A Reliable (k, N) Image Secret Sharing Scheme.” 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (2006). doi:10.1109/dasc.2006.11.
Çalkavur, Selda, and Patrick Solé. “Multisecret-Sharing Schemes and Bounded Distance Decoding of Linear Codes.” International Journal of Computer Mathematics 94, no. 1 (October 16, 2015): 107–114. doi:10.1080/00207160.2015.1091071.
Alahmadi, Adel, Alaa Altassan, Ahmad AlKenani, Selda Çalkavur, Hatoon Shoaib, and Patrick Solé. “A Multisecret-Sharing Scheme Based on LCD Codes.” Mathematics 8, no. 2 (February 18, 2020): 272. doi:10.3390/math8020272.
Çalkavur, Selda, and Patrick Solé. “Some Multisecret-Sharing Schemes over Finite Fields.” Mathematics 8, no. 5 (April 25, 2020): 654. doi:10.3390/math8050654.
Çalkavur, Selda. “Secret Sharing Schemes Based on Extension Fields.” European Journal of Pure and Applied Mathematics 11, no. 2 (April 27, 2018): 410–416. doi:10.29020/nybg.ejpam.v11i2.3226.
Molla, Fatih, and Selda Çalkavur. “A New Approach to Construct Secret Sharing Schemes Based on Field Extensions.” European Journal of Pure and Applied Mathematics 11, no. 2 (April 27, 2018): 468–475. doi:10.29020/nybg.ejpam.v11i2.3250.
Calkavur, Selda. “An Image Secret Sharing Method Based on Shamir Secret Sharing.” Current Trends in Computer Sciences & Applications 1, no. 2 (November 20, 2018). doi:10.32474/ctcsa.2018.01.000106.
Lander, E. S. “Symmetric Designs: an Algebraic Approach” Cambridge University (January 20, 1983): 1–41. doi:10.1017/cbo9780511662164.002.
Padró, Carles. “Robust Vector Space Secret Sharing Schemes.” Information Processing Letters 68, no. 3 (November 1998): 107–111. doi:10.1016/s0020-0190(98)00149-5.
Ding, Cunsheng, Tero Laihonen, and Ari Renvall. "Linear multisecret-sharing schemes and error-correcting codes." Journal of Universal Computer Science 3, no. 9 (1997): 1023-1036.
DOI: 10.28991/esj-2020-01229
Refbacks
- There are currently no refbacks.
Copyright (c) 2020 Selda Çalkavur