{"id":"https://openalex.org/W4401112579","doi":"https://doi.org/10.3390/axioms13080515","title":"A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure","display_name":"A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure","publication_year":2024,"publication_date":"2024-07-30","ids":{"openalex":"https://openalex.org/W4401112579","doi":"https://doi.org/10.3390/axioms13080515"},"language":"en","primary_location":{"id":"doi:10.3390/axioms13080515","is_oa":true,"landing_page_url":"https://doi.org/10.3390/axioms13080515","pdf_url":"https://www.mdpi.com/2075-1680/13/8/515/pdf?version=1723803946","source":{"id":"https://openalex.org/S4210173132","display_name":"Axioms","issn_l":"2075-1680","issn":["2075-1680"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Axioms","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2075-1680/13/8/515/pdf?version=1723803946","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063787348","display_name":"Irfan Alam","orcid":"https://orcid.org/0000-0001-8596-907X"},"institutions":[{"id":"https://openalex.org/I464993","display_name":"Barkatullah University","ror":"https://ror.org/02ax13658","country_code":"IN","type":"education","lineage":["https://openalex.org/I464993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Irfan Alam","raw_affiliation_strings":["Cyber Security and Digital Forensics Division, SCAI, VIT Bhopal University, Sehore 466114, India"],"affiliations":[{"raw_affiliation_string":"Cyber Security and Digital Forensics Division, SCAI, VIT Bhopal University, Sehore 466114, India","institution_ids":["https://openalex.org/I464993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058870920","display_name":"Amal S. Alali","orcid":"https://orcid.org/0000-0001-7856-2861"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Amal S. Alali","raw_affiliation_strings":["Department of Mathematical Sciences, College of Science, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical Sciences, College of Science, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027105579","display_name":"Shakir Ali","orcid":"https://orcid.org/0000-0001-5162-7522"},"institutions":[{"id":"https://openalex.org/I171210897","display_name":"Aligarh Muslim University","ror":"https://ror.org/03kw9gc02","country_code":"IN","type":"education","lineage":["https://openalex.org/I171210897"]},{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["IN","MY"],"is_corresponding":true,"raw_author_name":"Shakir Ali","raw_affiliation_strings":["Department of Mathematics, Faculty of Science, Aligarh Muslim University, Aligarh 202002, India","Institute of Mathematical Sciences, Faculty of Science, University of Malaya, Kuala Lumpur 50603, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Faculty of Science, Aligarh Muslim University, Aligarh 202002, India","institution_ids":["https://openalex.org/I171210897"]},{"raw_affiliation_string":"Institute of Mathematical Sciences, Faculty of Science, University of Malaya, Kuala Lumpur 50603, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5106716288","display_name":"Muhammad Asri","orcid":null},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Muhammad S. M. Asri","raw_affiliation_strings":["Institute of Mathematical Sciences, Faculty of Science, University of Malaya, Kuala Lumpur 50603, Malaysia"],"affiliations":[{"raw_affiliation_string":"Institute of Mathematical Sciences, Faculty of Science, University of Malaya, Kuala Lumpur 50603, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027105579"],"corresponding_institution_ids":["https://openalex.org/I171210897","https://openalex.org/I33849332"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":1.022,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80118776,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"13","issue":"8","first_page":"515","last_page":"515"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.9669174551963806},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.770044207572937},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6595554947853088},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6096891760826111},{"id":"https://openalex.org/keywords/access-structure","display_name":"Access structure","score":0.5676347017288208},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.557691216468811},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35352128744125366},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.328647255897522},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.21367457509040833},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15724864602088928},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06869399547576904}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.9669174551963806},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.770044207572937},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6595554947853088},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6096891760826111},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.5676347017288208},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.557691216468811},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35352128744125366},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.328647255897522},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.21367457509040833},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15724864602088928},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06869399547576904},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/axioms13080515","is_oa":true,"landing_page_url":"https://doi.org/10.3390/axioms13080515","pdf_url":"https://www.mdpi.com/2075-1680/13/8/515/pdf?version=1723803946","source":{"id":"https://openalex.org/S4210173132","display_name":"Axioms","issn_l":"2075-1680","issn":["2075-1680"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Axioms","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:737634afbcde4992ba11cdd3329d451d","is_oa":true,"landing_page_url":"https://doaj.org/article/737634afbcde4992ba11cdd3329d451d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Axioms, Vol 13, Iss 8, p 515 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/axioms13080515","is_oa":true,"landing_page_url":"https://doi.org/10.3390/axioms13080515","pdf_url":"https://www.mdpi.com/2075-1680/13/8/515/pdf?version=1723803946","source":{"id":"https://openalex.org/S4210173132","display_name":"Axioms","issn_l":"2075-1680","issn":["2075-1680"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Axioms","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2053653470","display_name":null,"funder_award_id":"PNURSP","funder_id":"https://openalex.org/F4320322484","funder_display_name":"Princess Nourah Bint Abdulrahman University"},{"id":"https://openalex.org/G3551762329","display_name":null,"funder_award_id":"PNURSP2024R2","funder_id":"https://openalex.org/F4320322484","funder_display_name":"Princess Nourah Bint Abdulrahman University"},{"id":"https://openalex.org/G4010074732","display_name":null,"funder_award_id":"Riyadh","funder_id":"https://openalex.org/F4320322484","funder_display_name":"Princess Nourah Bint Abdulrahman University"},{"id":"https://openalex.org/G4431910450","display_name":null,"funder_award_id":"PNURSP2024R231","funder_id":"https://openalex.org/F4320322484","funder_display_name":"Princess Nourah Bint Abdulrahman University"}],"funders":[{"id":"https://openalex.org/F4320322484","display_name":"Princess Nourah Bint Abdulrahman University","ror":"https://ror.org/05b0cyh02"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4401112579.pdf","grobid_xml":"https://content.openalex.org/works/W4401112579.grobid-xml"},"referenced_works_count":61,"referenced_works":["https://openalex.org/W1504941013","https://openalex.org/W1943392172","https://openalex.org/W1977973619","https://openalex.org/W1979102510","https://openalex.org/W1980354539","https://openalex.org/W1984639255","https://openalex.org/W1997820219","https://openalex.org/W2018562795","https://openalex.org/W2029693536","https://openalex.org/W2033280542","https://openalex.org/W2045149013","https://openalex.org/W2088866196","https://openalex.org/W2094758646","https://openalex.org/W2101330985","https://openalex.org/W2133062571","https://openalex.org/W2137077755","https://openalex.org/W2141420453","https://openalex.org/W2168325212","https://openalex.org/W2200663004","https://openalex.org/W2542956184","https://openalex.org/W2758645964","https://openalex.org/W2779952822","https://openalex.org/W2792527638","https://openalex.org/W2801698980","https://openalex.org/W2810235999","https://openalex.org/W2970097841","https://openalex.org/W3008319366","https://openalex.org/W3027286516","https://openalex.org/W3045631847","https://openalex.org/W3048929175","https://openalex.org/W3119685717","https://openalex.org/W3124134419","https://openalex.org/W3148652263","https://openalex.org/W3198828278","https://openalex.org/W3209408370","https://openalex.org/W3209734538","https://openalex.org/W3215701547","https://openalex.org/W4200317173","https://openalex.org/W4220964700","https://openalex.org/W4225966072","https://openalex.org/W4236478587","https://openalex.org/W4287831822","https://openalex.org/W4311781006","https://openalex.org/W4317436412","https://openalex.org/W4318778638","https://openalex.org/W4319166074","https://openalex.org/W4322743826","https://openalex.org/W4328118242","https://openalex.org/W4361003387","https://openalex.org/W4376876050","https://openalex.org/W4384787485","https://openalex.org/W4389185880","https://openalex.org/W6630262158","https://openalex.org/W6640781362","https://openalex.org/W6644861043","https://openalex.org/W6685844717","https://openalex.org/W6689398976","https://openalex.org/W6751440537","https://openalex.org/W6788430308","https://openalex.org/W6848080473","https://openalex.org/W7019560907"],"related_works":["https://openalex.org/W2110815651","https://openalex.org/W2366494566","https://openalex.org/W1492546183","https://openalex.org/W2348261841","https://openalex.org/W2963202145","https://openalex.org/W2350562606","https://openalex.org/W2388761115","https://openalex.org/W2377000132","https://openalex.org/W2102371935","https://openalex.org/W2611818227"],"abstract_inverted_index":{"Sharing":[0],"confidential":[1],"information":[2],"is":[3],"a":[4,19,64,82],"critical":[5],"concern":[6],"in":[7,18,103,166],"today\u2019s":[8],"world.":[9],"Secret":[10],"sharing":[11,15,37,122],"schemes":[12,38,113],"facilitate":[13],"the":[14,29,61,69,87,93,105,121,140,155],"of":[16,75,89,123,159],"secrets":[17],"way":[20],"that":[21,114],"ensures":[22],"only":[23],"authorized":[24],"participants":[25,46,55,90,99],"(shareholders)":[26],"can":[27,59],"access":[28,117],"secret":[30,36,62,106],"using":[31],"their":[32],"allocated":[33],"shares.":[34],"Hierarchical":[35],"(HSSSs)":[39],"build":[40],"upon":[41],"Shamir\u2019s":[42],"scheme":[43,129],"by":[44],"organizing":[45],"into":[47],"different":[48],"levels":[49],"based":[50],"on":[51],"priority.":[52],"Within":[53],"HSSS,":[54],"at":[56,95,107],"each":[57],"level":[58,80],"reconstruct":[60],"if":[63],"specified":[65],"number,":[66],"denoted":[67],"as":[68],"threshold":[70,84,94],"value":[71],"(t),":[72],"or":[73],"more":[74],"them":[76],"are":[77],"present.":[78],"Each":[79],"has":[81],"predetermined":[83],"value.":[85],"If":[86],"number":[88],"falls":[91],"below":[92],"any":[96],"level,":[97],"higher-level":[98],"must":[100],"be":[101],"involved":[102],"reconstructing":[104],"lower":[108],"levels.":[109],"Our":[110],"paper":[111],"proposes":[112],"implement":[115],"hierarchical":[116],"structures":[118],"and":[119,138,148,157],"enable":[120],"multiple":[124],"secrets.":[125],"Additionally,":[126],"our":[127,160],"proposed":[128,161],"includes":[130],"share":[131],"verification.":[132],"We":[133],"have":[134],"analyzed":[135],"potential":[136],"attacks":[137],"demonstrated":[139],"scheme\u2019s":[141],"resistance":[142],"against":[143],"them.":[144],"Through":[145],"security":[146],"analysis":[147],"comparison":[149],"with":[150],"existing":[151],"schemes,":[152],"we":[153],"highlight":[154],"novelty":[156],"superiority":[158],"approach,":[162],"contributing":[163],"to":[164],"advancements":[165],"secure":[167],"information-sharing":[168],"practices.":[169]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
