{"id":"https://openalex.org/W2806437452","doi":"https://doi.org/10.1186/s13638-018-1086-5","title":"(t,n) multi-secret sharing scheme extended from Harn-Hsu\u2019s scheme","display_name":"(t,n) multi-secret sharing scheme extended from Harn-Hsu\u2019s scheme","publication_year":2018,"publication_date":"2018-04-02","ids":{"openalex":"https://openalex.org/W2806437452","doi":"https://doi.org/10.1186/s13638-018-1086-5","mag":"2806437452"},"language":"en","primary_location":{"id":"doi:10.1186/s13638-018-1086-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-018-1086-5","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-018-1086-5","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-018-1086-5","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101865417","display_name":"Tong Zhang","orcid":"https://orcid.org/0000-0003-2989-256X"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tong Zhang","raw_affiliation_strings":["Department of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, 710048, China","Department of Computer Science and Engineering, Xi'an University of Technology, Xi'an, 710048, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, 710048, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Xi'an University of Technology, Xi'an, 710048, China","institution_ids":["https://openalex.org/I4210131919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085538246","display_name":"Xizheng Ke","orcid":"https://orcid.org/0000-0002-5431-8845"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xizheng Ke","raw_affiliation_strings":["Department of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, 710048, China","Department of Computer Science and Engineering, Xi'an University of Technology, Xi'an, 710048, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, 710048, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Xi'an University of Technology, Xi'an, 710048, China","institution_ids":["https://openalex.org/I4210131919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023387787","display_name":"Yanxiao Liu","orcid":"https://orcid.org/0000-0002-2507-5143"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanxiao Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, 710048, China","Department of Computer Science and Engineering, Xi'an University of Technology, Xi'an, 710048, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, 710048, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Xi'an University of Technology, Xi'an, 710048, China","institution_ids":["https://openalex.org/I4210131919"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101865417"],"corresponding_institution_ids":["https://openalex.org/I4210131919"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":1.0154,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.82353244,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2018","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9754999876022339,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.8385159373283386},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7052175402641296},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.6925325393676758},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6418664455413818},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41030949354171753},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.37274956703186035},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.28504008054733276},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.07822263240814209},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.07139980792999268}],"concepts":[{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.8385159373283386},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7052175402641296},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.6925325393676758},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6418664455413818},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41030949354171753},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37274956703186035},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.28504008054733276},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.07822263240814209},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.07139980792999268},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13638-018-1086-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-018-1086-5","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-018-1086-5","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:935c3b01ef8f4e00aa7f43d5fb0911d3","is_oa":true,"landing_page_url":"https://doaj.org/article/935c3b01ef8f4e00aa7f43d5fb0911d3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking, Vol 2018, Iss 1, Pp 1-4 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13638-018-1086-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-018-1086-5","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-018-1086-5","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7555643526","display_name":null,"funder_award_id":"61502384","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320325627","display_name":"Education Department of Shaanxi Province","ror":null},{"id":"https://openalex.org/F4320336565","display_name":"Key Science and Technology Program of Shaanxi Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2806437452.pdf","grobid_xml":"https://content.openalex.org/works/W2806437452.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W1535684794","https://openalex.org/W2057324245","https://openalex.org/W2059295401","https://openalex.org/W2108549024","https://openalex.org/W2108657309","https://openalex.org/W2137077755","https://openalex.org/W2141420453","https://openalex.org/W2542956184","https://openalex.org/W2620528906","https://openalex.org/W2747346453","https://openalex.org/W3023586415"],"related_works":["https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2006088653","https://openalex.org/W2544423928","https://openalex.org/W1574442789","https://openalex.org/W2223862429","https://openalex.org/W4255148435","https://openalex.org/W2053286651","https://openalex.org/W1994257264","https://openalex.org/W1984242286"],"abstract_inverted_index":{"Multi-secret":[0],"sharing":[1,13,74,149],"scheme":[2,75,85,90,142,150,159],"has":[3],"been":[4],"well":[5],"studied":[6],"in":[7,39,118],"recent":[8],"years.":[9],"In":[10,28,133],"most":[11],"multi-secret":[12,73,148],"schemes,":[14],"all":[15,101],"secrets":[16,47,57,105],"must":[17],"be":[18,24,49,107,129],"recovered":[19],"synchronously;":[20],"the":[21,45,53,81,102,123,138,161],"shares":[22],"cannot":[23],"reused":[25],"any":[26,61,110],"more.":[27],"2017,":[29],"Harn":[30,66,165],"and":[31,36,52,67,88,143,166],"Hsu":[32,68],"proposed":[33,70,158],"a":[34,71,145],"novel":[35],"reasonable":[37],"feature":[38,162],"multiple":[40,46],"secret":[41,98],"sharing,":[42],"such":[43],"that":[44,76,122],"should":[48],"reconstructed":[50],"asynchronously":[51],"recovering":[54],"of":[55,140],"previous":[56],"do":[58],"not":[59],"leak":[60],"information":[62],"on":[63,83],"unrecovered":[64,104],"secrets.":[65],"also":[69],"(t,n)":[72,147],"satisfies":[77,160],"this":[78,94,134],"feature.":[79,95],"However,":[80],"analysis":[82],"Harn-Hsu\u2019s":[84,119,141,155],"is":[86,99,121,152],"wrong,":[87],"their":[89],"fails":[91],"to":[92],"satisfy":[93],"If":[96],"one":[97],"reconstructed,":[100],"other":[103],"can":[106],"computed":[108],"by":[109,164],"t":[111],"\u2212":[112],"1":[113],"shareholders":[114],"illegitimately.":[115],"Another":[116],"problem":[117],"work":[120],"parameters":[124],"are":[125],"unreasonable":[126],"which":[127,151],"will":[128],"shown":[130],"as":[131],"follows.":[132],"paper,":[135],"we":[136],"prove":[137],"incorrectness":[139],"propose":[144],"new":[146],"extended":[153],"from":[154],"scheme;":[156],"our":[157],"introduced":[163],"Hsu.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
