Sciweavers

241 search results - page 7 / 49
» On Proactive Secret Sharing Schemes
Sort
View
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 8 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
IPL
2006
87views more  IPL 2006»
13 years 8 months ago
Strongly secure ramp secret sharing schemes for general access structures
Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly...
Mitsugu Iwamoto, Hirosuke Yamamoto
CORR
2002
Springer
122views Education» more  CORR 2002»
13 years 8 months ago
On alternative approach for verifiable secret sharing
The proposed approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants. T...
Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
ICITS
2009
13 years 6 months ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...
DCC
2006
IEEE
14 years 8 months ago
A Flaw in the Use of Minimal Defining Sets for Secret Sharing Schemes
It is shown that in some cases it is possible to reconstruct a block design D uniquely from incomplete knowledge of a minimal defining set for D. This surprising result has implic...
Mike J. Grannell, Terry S. Griggs, Anne Penfold St...