Sciweavers

241 search results - page 8 / 49
» On Proactive Secret Sharing Schemes
Sort
View
JCM
2007
82views more  JCM 2007»
13 years 8 months ago
Secret Sharing Schemes With General Access Structure Based On MSPs
— In this paper we introduce two operations of access structure to build large monotone span programs MSPs from small MSPs. Furthermore, we point out a new method of constructing...
Jun Xu, Xiaomin Zha
ACNS
2006
Springer
92views Cryptology» more  ACNS 2006»
14 years 2 months ago
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing
The visual secret sharing (VSS for short) scheme is a secret image sharing scheme. A secret image is visually revealed from overlapping shadow images without additional computation...
Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen
TIT
2008
147views more  TIT 2008»
13 years 8 months ago
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special cla...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
14 years 10 days ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang