Personal information

Activities

Works (34)

Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication

CAAI Transactions on Intelligence Technology
2024-12 | Journal article
Contributors: Sara Charoghchi; Zahra Saeidi; Samaneh Mashhadi
Source: check_circle
Crossref

Two meaningful secret image sharing schemes based on integer wavelet transform and $${\text {LWE}}$$

Computational and Applied Mathematics
2024-04 | Journal article
Contributors: Zahra Saeidi; Samaneh Mashhadi
Source: check_circle
Crossref

LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)

IET Image Processing
2024-03 | Journal article
Contributors: Massoud Hadian Dehkordi; Seyed Taghi Farahi; Samaneh Mashhadi
Source: check_circle
Crossref

High performance image steganography integrating IWT and Hamming code within secret sharing

IET Image Processing
2024-01 | Journal article
Contributors: Zahra Saeidi; Ameneh Yazdi; Samaneh Mashhadi; Masoud Hadian; Adnan Gutub
Source: check_circle
Crossref

A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problem

Multimedia Tools and Applications
2023-10 | Journal article
Contributors: Samaneh Mashhadi; Zahra Saeedi
Source: check_circle
Crossref

A secure secret image sharing with steganography and authentication by Hamming code (15,11) for compressed images

Multimedia Tools and Applications
2023-09-19 | Journal article
Contributors: Sara Charoghchi; Samaneh Mashhadi
Source: check_circle
Crossref

OPTP: A new steganography scheme with high capacity and security

Multimedia Tools and Applications
2023-07-24 | Journal article
Part of ISSN: 1380-7501
Part of ISSN: 1573-7721
Contributors: Massoud Hadian Dehkordi; Samaneh Mashhadi; Seyed Taghi Farahi; Mohammad Hossein Noorallahzadeh; Shahed Vahedi; Ahmad Gholami; Reza Alimoradi
Source: Self-asserted source
Samaneh Mashhadi

Non-interactive verifiable LWE-based multi secret sharing scheme

Multimedia Tools and Applications
2023-06 | Journal article
Contributors: Niloofar Kiamari; Massoud Hadian; Samaneh Mashhadi
Source: check_circle
Crossref

Game-based security proofs for verifiable secret sharing schemes in the standard model

Information Security Journal: A Global Perspective
2023-05-04 | Journal article
Contributors: Samaneh Mashhadi
Source: check_circle
Crossref

Verifiable quantum secret sharing with multi access structures

Optik
2022-11 | Journal article
Contributors: Samaneh Mashhadi
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme

Designs, Codes and Cryptography
2022-08 | Journal article
Contributors: Samaneh Mashahdi; Bagher Bagherpour; Ali Zaghian
Source: check_circle
Crossref

Improvement of a (t,n) Threshold d−Level Quantum Secret Sharing Scheme

Journal of Applied Security Research
2022-01-02 | Journal article
Contributors: Samaneh Mashhadi
Source: check_circle
Crossref

Three (t,n)-secret image sharing schemes based on homogeneous linear recursion

Information Sciences
2021-04 | Journal article
Part of ISSN: 0020-0255
Source: Self-asserted source
Samaneh Mashhadi

Toward a formal proof for multi-secret sharing in the random oracle model

Information Security Journal: A Global Perspective
2020-09-02 | Journal article
Contributors: Samaneh Mashhadi
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A CSA-Secure Multi-Secret Sharing Scheme in the Standard Model

Journal of Applied Security Research
2020-01-02 | Journal article
Contributors: Samaneh Mashhadi
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

General secret sharing based on quantum Fourier transform

2019-04 | Journal article
Part of ISSN: 1570-0755
Part of ISSN: 1573-1332
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 4)‎

A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure

2019-01 | Journal article
Part of ISSN: 0929-6212
Part of ISSN: 1572-834X
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 3)‎

New multi-stage secret sharing in the standard model

2017-11 | Journal article
Part of ISSN: 0020-0190
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 3)‎

Provably secure verifiable multi-stage secret sharing scheme based on monotone span program

2017-11-01 | Journal article
Part of ISSN: 1751-8709
Part of ISSN: 1751-8717
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 3)‎

Secure publicly verifiable and proactive secret sharing schemes with general access structure

2017-02 | Journal article
Part of ISSN: 0020-0255
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 3)‎

Analysis of warrant attacks on some threshold proxy signature schemes

Journal of Information Processing Systems
2016 | Journal article
EID:

2-s2.0-84987646074

Contributors: Mashhadi, S.
Source: Self-asserted source
Samaneh Mashhadi via Scopus - Elsevier
grade
Preferred source (of 2)‎

Share secrets stage by stage with homogeneous linear feedback shift register in the standard model

2016-11-25 | Journal article
Part of ISSN: 1939-0114
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 3)‎

How to Fairly Share Multiple Secrets Stage by Stage

2016-09 | Journal article
Part of ISSN: 0929-6212
Part of ISSN: 1572-834X
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 3)‎

Computationally Secure Multiple Secret Sharing: Models, Schemes, and Formal Security Analysis

Isecure-isc International Journal of Information Security
2015 | Journal article
Source: check_circle
Web of Science Researcher Profile Sync

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

2015-07 | Journal article
Source: Self-asserted source
Samaneh Mashhadi

Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem

2015-02 | Journal article
Part of ISSN: 0020-0255
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 4)‎

A novel non-repudiable threshold proxy signature scheme with known signers

International Journal of Network Security
2013 | Journal article
EID:

2-s2.0-84881490172

Contributors: Mashhadi, S.
Source: Self-asserted source
Samaneh Mashhadi via Scopus - Elsevier

A novel secure self proxy signature scheme

International Journal of Network Security
2012 | Journal article
EID:

2-s2.0-84858176484

Contributors: Mashhadi, S.
Source: Self-asserted source
Samaneh Mashhadi via Scopus - Elsevier

Analysis of frame attack on Hsu et al.’s non-repudiable threshold multi-proxy multi-signature scheme with shared verification

2012-06 | Journal article
Part of ISSN: 1026-3098
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 3)‎

Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves

2008-06 | Journal article
Part of ISSN: 0140-3664
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 3)‎

New efficient and practical verifiable multi-secret sharing schemes

2008-05-01 | Journal article
Part of ISSN: 0020-0255
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 3)‎

An efficient threshold verifiable multi-secret sharing

2008-03 | Journal article
Part of ISSN: 0920-5489
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 3)‎

A Verifiable Essential Secret Image Sharing scheme based on HLRs (VESIS-(t, s, k, n))

CAAI Transactions on Intelligence Technology
Journal article
Contributors: Samaneh Mashhadi
Source: Self-asserted source
Samaneh Mashhadi
grade
Preferred source (of 5)‎

Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes

Journal of Information Processing Systems
Journal article
Source: Self-asserted source
Samaneh Mashhadi