• All Solutions All Solutions Caret
    • Editage

      One platform for all researcher needs

    • Paperpal

      AI-powered academic writing assistant

    • R Discovery

      Your #1 AI companion for literature search

    • Mind the Graph

      AI tool for graphics, illustrations, and artwork

    Unlock unlimited use of all AI tools with the Editage Plus membership.

    Explore Editage Plus
  • Support All Solutions Support
    discovery@researcher.life
Discovery Logo
Paper
Search Paper
Cancel
Ask R Discovery
Explore

Feature

  • menu top paper My Feed
  • library Library
  • translate papers linkAsk R Discovery
  • chat pdf header iconChat PDF
  • audio papers link Audio Papers
  • translate papers link Paper Translation
  • chrome extension Chrome Extension

Content Type

  • preprints Preprints
  • conference papers Conference Papers
  • journal articles Journal Articles

More

  • resources areas Research Areas
  • topics Topics
  • resources Resources
git a planGift a Plan

General Access Structures Research Articles

  • Share Topic
  • Share on Facebook
  • Share on Twitter
  • Share on Mail
  • Share on SimilarCopy to clipboard
Follow Topic R Discovery
By following a topic, you will receive articles in your feed and get email alerts on round-ups.
Overview
121 Articles

Published in last 50 years

Related Topics

  • Secret Sharing Scheme
  • Secret Sharing Scheme
  • Compartmented Access Structures
  • Compartmented Access Structures
  • Compartmented Access
  • Compartmented Access

Articles published on General Access Structures

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
121 Search results
Sort by
Recency
Authenticated general hierarchical multi-secret sharing scheme based on high-dimensional quantum system

Abstract Quantum secret sharing, a pivotal research domain within quantum cryptography, has significant applications across diverse fields such as information security and distributed quantum computing. This paper proposes a d-dimensional hierarchical quantum multi-secret sharing scheme with a general access structure. In the proposed scheme, the distributor constructs a special entangled state by leveraging the secret values at each level and a monotone span program. During the secret reconstruction phase, participants only need to measure the particles in their possession, and authorized participants at each level can recover multiple secrets shared at that level. Additionally, each participant can independently compute and obtain multiple lower-level secrets but cannot access any higher-level secret information. Compared to existing hierarchical quantum secret sharing schemes, the proposed scheme is better suited for specific application scenarios with unique requirements. Furthermore, security analysis demonstrates that the scheme can resist various attacks, such as measurement attacks, intercept-resend attacks, entanglement-measurement attacks, Trojan horse attacks, and collusion attacks.

Read full abstract
  • Journal IconPhysica Scripta
  • Publication Date IconMay 2, 2025
  • Author Icon Yuehua Li + 4
Just Published Icon Just Published
Cite IconCite
Save

On Multi-image Random Grids by Arbitrary Transformations

Random grids are a method for visual secret sharing, whereby a secret image is encoded into a number of shares, each of which is maximally entropic. There has been growing interest in hiding multiple images in a scheme, such that additional images are revealed by stacking the shares in different ways. This paper proposes a metaheuristic method for generating schemes that allow for a wide range of transformations, or even combinations thereof, to reveal an arbitrary number of secret images. Up to 10 multi-secrets are shown in this paper, as well as hiding multiple secrets in a general access structure. To remove noise from these schemes an algorithm is proposed to extract the information from the noise, and in all cases, relative contrasts are given. In one example, six images are hidden in two shares, such that the mean relative contrast under OR-stacking is 0.152, under XOR-stacking 0.278, and with noise removed, it is 0.74. In an example hiding 10 images in two shares, the values are respectively 0.136, 0.206 and 0.679, respectively.

Read full abstract
  • Journal IconHuman-Centric Intelligent Systems
  • Publication Date IconJan 29, 2024
  • Author Icon Neil Buckley + 2
Open Access Icon Open Access
Cite IconCite
Save

Sharing Visual Secrets Among Multiple Groups With Enhanced Performance

An almost unexplored research topic in visual secret sharing (VSS), i.e., sharing different visual secrets among various groups, is investigated in this article. Generally, multiple groups are cooperated together to encrypt multiple visual secrets, where every group is correlated with a VSS scheme to share one secret and each participant receives only one shadow. Such a cooperative system is referred to as cooperative VSS (CVSS). In this paper, we develop a general construction for CVSS with improved computational overhead. The basis matrices for generating the shadows are easily obtained. To improve the recovered image quality, an efficient XOR-based CVSS (XCVSS) is given. Furthermore, to fulfill the requirement of implementing complex sharing policy, the XCVSS is extended to collaborate general access structure (GAS) VSS schemes together. Theoretical and experimental results and comparisons are illustrated to demonstrate the advantages of the proposed techniques.

Read full abstract
  • Journal IconIEEE Transactions on Circuits and Systems for Video Technology
  • Publication Date IconNov 1, 2023
  • Author Icon Xiaotian Wu + 2
Cite IconCite
Save

Dynamic hierarchical quantum secret sharing with general access structure

Dynamic hierarchical quantum secret sharing with general access structure

Read full abstract
  • Journal IconQuantum Information Processing
  • Publication Date IconAug 22, 2023
  • Author Icon Fulin Li + 4
Cite IconCite
Save

Proactive visual cryptographic schemes for general access structures

Proactive visual cryptographic schemes for general access structures

Read full abstract
  • Journal IconMultimedia Tools and Applications
  • Publication Date IconApr 4, 2023
  • Author Icon Praveen K + 3
Cite IconCite
Save

Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric PIR

Ramp secret sharing is a variant of secret sharing which can achieve better information ratio than perfect schemes by allowing some partial information on a secret to leak out. Strongly secure ramp schemes can control the amount of leaked information on the components of a secret. In this paper, we reduce the construction of strongly secure ramp secret sharing for general access structures to a linear algebraic problem. As a result, we show that previous results on strongly secure network coding imply two linear transformation methods to make a given linear ramp scheme strongly secure. They are explicit or provide a deterministic algorithm while the previous methods which work for any linear ramp scheme are non-constructive. In addition, we present a novel application of strongly secure ramp schemes to symmetric PIR in a multi-user setting. Our solution is advantageous over those based on a non-strongly secure scheme in that it reduces the amount of communication between users and servers and also the amount of correlated randomness that servers generate in the setup.

Read full abstract
  • Journal IconIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
  • Publication Date IconMar 1, 2023
  • Author Icon Reo Eriguchi + 2
Open Access Icon Open Access
Cite IconCite
Save

Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval With General Access Structure

We study the equivalence between non-perfect secret sharing (NSS) and symmetric private information retrieval (SPIR) with arbitrary response and collusion patterns. NSS and SPIR are defined with an access structure, which corresponds to the authorized/forbidden sets for NSS and the response/collusion patterns for SPIR. We prove the equivalence between NSS and SPIR in the following two senses. 1) Given any SPIR protocol with an access structure, an NSS protocol is constructed with the same access structure and the same rate. 2) Given any linear NSS protocol with an access structure, a linear SPIR protocol is constructed with the same access structure and the same rate. We prove the first relation even if the SPIR protocol has imperfect correctness and secrecy. From the first relation, we derive an upper bound of the SPIR capacity for arbitrary response and collusion patterns. For the special case of $\mathsf{n}$-server SPIR with $\mathsf{r}$ responsive and $\mathsf{t}$ colluding servers, this upper bound proves that the SPIR capacity is $(\mathsf{r}-\mathsf{t})/\mathsf{n}$. From the second relation, we prove that a SPIR protocol exists for any response and collusion patterns.

Read full abstract
  • Journal IconIEEE Journal on Selected Areas in Communications
  • Publication Date IconMar 1, 2022
  • Author Icon Seunghoan Song + 1
Open Access Icon Open Access
Cite IconCite
Save

A perfect secret sharing scheme for general access structures

A perfect secret sharing scheme for general access structures

Read full abstract
  • Journal IconInformation Sciences
  • Publication Date IconFeb 14, 2022
  • Author Icon Xingxing Jia + 4
Cite IconCite
Save

Towards cheat-preventing in block-based progressive visual cryptography for general access structures

Towards cheat-preventing in block-based progressive visual cryptography for general access structures

Read full abstract
  • Journal IconInformation Sciences
  • Publication Date IconNov 18, 2021
  • Author Icon Xiaotian Wu + 1
Cite IconCite
Save

Extended XOR-based visual cryptography schemes by integer linear program

Extended XOR-based visual cryptography schemes by integer linear program

Read full abstract
  • Journal IconSignal Processing
  • Publication Date IconApr 16, 2021
  • Author Icon Xiaotian Wu + 2
Cite IconCite
Save

A (k, n) multi-secret image sharing scheme based on Chinese remainder theorem and Arnold cat map

A multi-secret image sharing (MSIS) scheme is a procedure to break down secret images into numerous shares and distribute each share to each authorized participant. Most existing ( n , n ) schemes face the problem of all-or-nothing that is all the n shares are required to reconstruct a secret image. If a single share is lost, then the secret image will not be recovered. Moreover, the existing ( k , n ) MSIS schemes either require k consecutive shares or general access structure to recover the secret images. The proposed scheme addresses the previous schemes’ issues. It is based on Arnold cat map, Chinese remainder theorem (CRT), and Boolean operation. It is a ( k , n ) threshold scheme where k is the threshold, and n is the number of participants. Arnold cat map is adopted for the randomization of images, and Boolean operation is used for producing public share images. CRT is utilized for the recovery of images. It has high fault tolerance capability as any of the k participants can submit their shares to reconstruct images and consume less computational time due to employing the modular method. Moreover, it can withstand differential as well as statistical attacks.

Read full abstract
  • Journal IconJournal of Electronic Imaging
  • Publication Date IconMar 10, 2021
  • Author Icon Oinam B Chanu + 1
Cite IconCite
Save

Weighted visual secret sharing for general access structures based on random grids

Weighted visual secret sharing for general access structures based on random grids

Read full abstract
  • Journal IconSignal Processing: Image Communication
  • Publication Date IconJan 4, 2021
  • Author Icon Zuquan Liu + 3
Cite IconCite
Save

Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares

A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex algebraic-based methods, which can realize the sharing of multi secret images. However, the existing Boolean-based multi secret sharing schemes are mostly restricted to the particular case of (2, n) and (n, n), only few Boolean-based multi secret sharing schemes study the general access structure, and the shares are mostly meaningless. In this paper, a new Boolean-based multi secret sharing scheme with the general access structure is proposed. All the shares are meaningful, which can avoid attracting the attention of adversaries, and the secret images can be recovered in a lossless manner. The feasibility of the scheme is proven, the performance is validated by the experiments on the gray images, and the analysis of the comparison with other methods is also given out.

Read full abstract
  • Journal IconMathematics
  • Publication Date IconSep 14, 2020
  • Author Icon Hongliang Cai + 1
Open Access Icon Open Access
Cite IconCite
Save

Strong security of linear ramp secret sharing schemes with general access structures

Strong security of linear ramp secret sharing schemes with general access structures

Read full abstract
  • Journal IconInformation Processing Letters
  • Publication Date IconAug 5, 2020
  • Author Icon Reo Eriguchi + 1
Open Access Icon Open Access
Cite IconCite
Save

A Common General Access Structure Construction Approach in Secret Image Sharing

(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS), polynomial-based SIS, linear congruence (LC)-based SIS, etc., were proposed with only (k, k) threshold or (k, n) threshold other than GAS. This article introduces a common GAS construction approach in SIS with on pixel expansion from existing (k, k) threshold or (k, n) threshold SIS. The authors input classic SIS methods to test the efficiency and feasibility of the proposed common GAS construction approach. Experiments are presented to indicate the efficiency of the approach by illustrations and analysis.

Read full abstract
  • Journal IconInternational Journal of Digital Crime and Forensics
  • Publication Date IconJul 1, 2020
  • Author Icon Xuehu Yan + 2
Open Access Icon Open Access
Cite IconCite
Save

Multiple secret image sharing with general access structure

Boolean-operation-based secret image sharing (BSIS), which aims to encode a secret image into some shared images and discloses the original secret image later, has drawn more and more attention in academia. Since Chen and Wu pioneer in proposing the Boolean-operation-based multiple secret image sharing (BMSIS) scheme, there more and more BMSIS schemes proposed in the literature. In order to remove the limitation that in the existing BMSIS schemes, this paper presents Boolean-operation-based multiple-secret image sharing with general access structure for secret reconstruction. Compared with the existing related BMSIS schemes with the property of all-or-nothing reconstruction, the proposed scheme achieves a milestone, i.e., secrets can be reconstructed by the pre-defined access structure. Hence, the secret reconstruction no longer needs to collect all share images. Furthermore, distinct combinations of shares have the ability to disclose the secrets defined in the qualified set. The theoretical analysis and the experimental results demonstrate the proposed scheme does work.

Read full abstract
  • Journal IconMultimedia Tools and Applications
  • Publication Date IconJan 28, 2020
  • Author Icon Tzung-Her Chen + 1
Cite IconCite
Save

A Novel Message Authentication Scheme With Absolute Privacy for the Internet of Things Networks

With the rapid development and massive deployment of the Internet of things (IoT) networks, security related issues in the IoT networks have been paid more and more attention to. Among all the security concerns, message authentication is critical in preventing the unauthorized messages from being transmitted in the IoT networks. Many message authentication schemes have been proposed based on the public-key cryptosystem, where the key management is simple and scalable. Identity based cryptosystem is a special type of public-key cryptosystem and can further ease the process of the key management since the public keys can be obtained easily. In this paper, we devise an efficient message authentication with enhanced privacy (IMAEP) scheme using the identity based signature. Our proposed scheme can provide both unconditional privacy as well as the enhanced privacy under full key exposure attack. Our proposed scheme can also provide existential unforgeability under the adaptive chosen-message-and-identity attack. Compared with the scheme that has the same level of anonymity and security, our proposed scheme has much lower computational overhead, and can provide extra unconditional privacy. Next we propose an extended IMAEP (EIMAEP) scheme for the general access structures where the message is signed by a group of users instead of one user. We also conduct comprehensive analysis and demonstrate that the EIMAEP scheme can achieve the same level of privacy and unforgeability as the IMAEP scheme.

Read full abstract
  • Journal IconIEEE Access
  • Publication Date IconJan 1, 2020
  • Author Icon Jian Li + 3
Open Access Icon Open Access
Cite IconCite
Save

Multi-Receiver Authentication Scheme for General Access Structure

Authentication is an important primitive of cryptography. With the rapid progress of network communication, the urgent data needs to ensure it integrity and privacy, therefore, the authentication of multi-receiver has a significant impact on the development of network interaction. R. Safavi-Nalni and H. Wang showed that authentication scheme based on Reed-Solomon code is unconditionally secure and allows multiple messages to be authenticated, but the number of receiver to verify is less than $q$ , where the messages are in $\mathbb {F}_{q}$ . In 2014, the secure multi-receiver authentication scheme base on linear code was proposed, however, this scheme can not realize any a given access structure. In this paper, we present a multi-receiver authentication scheme to realize any a given ideal access structure, and demonstrate that our scheme is unconditionally secure and allows $r$ messages to be authenticated with each receiver own private key.

Read full abstract
  • Journal IconIEEE Access
  • Publication Date IconJan 1, 2020
  • Author Icon Qiuxia Xu + 2
Open Access Icon Open Access
Cite IconCite
Save

Major Developments in Visual Cryptography

Visual cryptography is a cryptographic mechanism that gets applied in visual information protection for secured transfer of data. The encryption makes the decryption a mechanical operation.The secret image gets converted into several share images. The share images are distorted/ noisy images which will give the correct image only when placed in the right combination. This paper reviews various visual encryption and decryption mechanism with the safe transmission of information from the literature. This paper about visual cryptography discusses, general access structure, halftone, colour, progressive, region incrementing, extended visual cryptography, colour extended visual cryptography, XOR and OR visual cryptography and the applications of visual cryptography. The applications discussed here are banking security, steganography, crime records, intelligence communication, multilayered Id cards and fingerprint records. The paper provides an overview of advances in VCS where each technique overcomes the problem(s) faced in the other manner.

Read full abstract
  • Journal IconInternational Journal of Engineering and Advanced Technology
  • Publication Date IconDec 31, 2019
  • Author Icon Mr Surajit Goon
Open Access Icon Open Access
Cite IconCite
Save

How to construct a verifiable multi‐secret sharing scheme based on graded encoding schemes

In a verifiable multi-secret sharing scheme, a dealer distributes multiple secrets between a group of participants and also additional information is given that allows each participant to check whether his share is valid. In this study, the authors present a novel verifiable multi-secret sharing (VMSS) scheme with general access structure using monotone span programs, which its security is based on graded encoding schemes. More precisely, they reduce the hardness of graded decision-Diffie–Hellman problem to the computational security of the authors’ scheme in the standard model. To the best of the authors’ knowledge, this is the first study to present a VMSS scheme based on graded encoding schemes.

Read full abstract
  • Journal IconIET Information Security
  • Publication Date IconJul 1, 2019
  • Author Icon Massoud Hadian Dehkordi + 1
Cite IconCite
Save

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2025 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers