Sciweavers

241 search results - page 12 / 49
» On Proactive Secret Sharing Schemes
Sort
View
ICITS
2009
13 years 6 months ago
On the Optimization of Bipartite Secret Sharing Schemes
Oriol Farràs, Jessica Ruth Metcalf-Burton, ...
ACNS
2003
Springer
168views Cryptology» more  ACNS 2003»
14 years 1 months ago
PLI: A New Framework to Protect Digital Content for P2P Networks
In this paper, we first propose a novel Public License Infrastructure (PLI) that uses cryptographic threshold secret sharing schemes to provide decentralized public license service...
Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang
INFOCOM
1997
IEEE
14 years 24 days ago
Secret Sharing in Graph-Based Prohibited Structures
A secret sharing schemefor the prohibited structure is a method of sharing a master key among a finite set of participants in such a way that only certain pre-specified subsetsof ...
Hung-Min Sun, Shiuh-Pyng Shieh
CG
2002
Springer
13 years 8 months ago
Secret image sharing
Abstract. We present a novel hybrid method that includes a modulated scheme for reducing the distortion of the reconstructed image and a two-layered structure for grouping particip...
Chih-Ching Thien, Ja-Chen Lin
STORAGESS
2005
ACM
14 years 2 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough