Massoud Hadian Dehkordi

Orcid: 0000-0002-1239-7610

According to our database1, Massoud Hadian Dehkordi authored at least 30 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem.
Wirel. Pers. Commun., July, 2024

Changeable essential threshold secret image sharing scheme with verifiability using bloom filter.
Multim. Tools Appl., June, 2024

LWE-based verifiable essential secret image sharing scheme ( ( t , s , k , n ) $( {t,s,k,n} )$ - VESIS).
IET Image Process., March, 2024

OPTP: A new steganography scheme with high capacity and security.
Multim. Tools Appl., February, 2024

High performance image steganography integrating IWT and Hamming code within secret sharing.
IET Image Process., 2024

A verifiable essential secret image sharing scheme based on HLRs (VESIS-(<i>t</i>, <i>s</i>, <i>k</i>, <i>n</i>)).
CAAI Trans. Intell. Technol., 2024

2023
Non-interactive verifiable LWE-based multi secret sharing scheme.
Multim. Tools Appl., 2023

2022
Simorgh, a fully decentralized blockchain-based secure communication system.
J. Ambient Intell. Humaniz. Comput., 2022

A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes.
ISC Int. J. Inf. Secur., 2022

2019
A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure.
Wirel. Pers. Commun., 2019

How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes.
IET Inf. Secur., 2019

A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes.
IACR Cryptol. ePrint Arch., 2019

2018
Efficient multisecret sharing scheme using new proposed computational security model.
Int. J. Commun. Syst., 2018

Quantum Symmetric Cryptosystem Based on Algebraic Codes.
IEEE Commun. Lett., 2018

2017
Private and Efficient Query Processing on Outsourced Genomic Databases.
IEEE J. Biomed. Health Informatics, 2017

Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256.
J. Math. Cryptol., 2017

The complexity of the connected graph access structure on seven participants.
J. Math. Cryptol., 2017

Provably secure verifiable multi-stage secret sharing scheme based on monotone span program.
IET Inf. Secur., 2017

2016
A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution.
Wirel. Pers. Commun., 2016

2015
Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem.
Inf. Sci., 2015

2014
Certificateless identification protocols from super singular elliptic curve.
Secur. Commun. Networks, 2014

2013
Threshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-Zeilinger state.
Quantum Inf. Process., 2013

Perfect secret sharing schemes for graph access structures on six participants.
J. Math. Cryptol., 2013

The complexity of the graph access structures on six participants.
Des. Codes Cryptogr., 2013

Average complexities of access structures on five participants.
Adv. Math. Commun., 2013

2011
Identity-Based Multiple Key Agreement Scheme.
KSII Trans. Internet Inf. Syst., 2011

2009
A New batch Identification Scheme.
Discret. Math. Algorithms Appl., 2009

2008
New efficient and practical verifiable multi-secret sharing schemes.
Inf. Sci., 2008

An efficient threshold verifiable multi-secret sharing.
Comput. Stand. Interfaces, 2008

Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves.
Comput. Commun., 2008


  Loading...