Sciweavers

225 search results - page 2 / 45
» Nonperfect Secret Sharing Schemes
Sort
View
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 7 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta
IEICET
2006
80views more  IEICET 2006»
13 years 7 months ago
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru...
IJNSEC
2006
111views more  IJNSEC 2006»
13 years 7 months ago
Ideal Secret Sharing Schemes from Permutations
The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restri...
Josef Pieprzyk, Xian-Mo Zhang
ICISC
2008
88views Cryptology» more  ICISC 2008»
13 years 8 months ago
Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images
We consider a visual secret sharing scheme with cyclic access structure for n secret images and n shares, where two consecutive shares decode one secret image. This secret sharing ...
Miyuki Uno, Mikio Kano
SCN
2008
Springer
128views Communications» more  SCN 2008»
13 years 7 months ago
On Linear Secret Sharing for Connectivity in Directed Graphs
In this work we study linear secret sharing schemes for s-t connectivity in directed graphs. In such schemes the parties are edges of a complete directed graph, and a set of partie...
Amos Beimel, Anat Paskin