[Home ] [Archive]    
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Registration ::
Main Menu
Home::
Journal Information::
Articles archive::
Submission Instruction::
Registration::
Submit article::
Site Facilities::
Contact us::
::
Google Scholar

Citation Indices from GS

Search in website

Advanced Search
Receive site information
Enter your Email in the following box to receive the site news and information.
:: Volume 13, Issue 1 (6-2022) ::
IJOR 2022, 13(1): 149-163 Back to browse issues page
Establishing secure communication based on the design of a visual secret sharing scheme
Avishan Salehi , Nikbakhsh Javadian *
Department of Industrial Engineering, Mazandaran University of Science & Technology, Babol, Iran , : nijavadian@ustmb.ac.ir
Abstract:   (1684 Views)
Today, a high volume of multimedia information is transmitted in computer networks, such as the internet, that the requirement for achieving high security level against unauthorized access. the visual secret sharing scheme is a cryptographic system without requiring a secret key that is able to encrypt information in a multi - user computer network. in this research, a visual secret sharing scheme including two strategies for binary communications and multiple relationships were considered. in binary communications, an entity plays a role in the role of the server and an entity in the role of the client 's service in this strategy using a network - based visual secret sharing scheme ( 2 , 2 ) a secure approach to establish double relations where the provider entity is sending confidential information after authentication of the client 's service. then, two main phases of registration and verification are performed on the basis of the visual secret sharing scheme based on random networks. in tuple communication ( n , n ) an entity plays a role in the role of the server and several entities in the role of the service, and then two main phases of registration and verification are executed.
 
Keywords: security, communication, computer networks, visual secret sharing, random networks.
Full-Text [PDF 889 kb]   (3299 Downloads)    
Type of Study: Original | Subject: Mathematical Modeling and Applications of OR
Received: 2023/04/29 | Accepted: 2022/05/30 | Published: 2022/05/30
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML     Print



Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 13, Issue 1 (6-2022) Back to browse issues page
مجله انجمن ایرانی تحقیق در عملیات Iranian Journal of Operations Research
Persian site map - English site map - Created in 0.07 seconds with 39 queries by YEKTAWEB 4679