Sciweavers

225 search results - page 11 / 45
» Nonperfect Secret Sharing Schemes
Sort
View
ISCI
2010
79views more  ISCI 2010»
13 years 5 months ago
Strong (n, t, n) verifiable secret sharing scheme
Lein Harn, Changlu Lin
INFOCOM
1997
IEEE
13 years 11 months ago
Secret Sharing in Graph-Based Prohibited Structures
A secret sharing schemefor the prohibited structure is a method of sharing a master key among a finite set of participants in such a way that only certain pre-specified subsetsof ...
Hung-Min Sun, Shiuh-Pyng Shieh
CG
2002
Springer
13 years 7 months ago
Secret image sharing
Abstract. We present a novel hybrid method that includes a modulated scheme for reducing the distortion of the reconstructed image and a two-layered structure for grouping particip...
Chih-Ching Thien, Ja-Chen Lin
STORAGESS
2005
ACM
14 years 28 days ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough