Sciweavers

391 search results - page 3 / 79
» On-Line Secret Sharing
Sort
View
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 7 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta
CORR
2002
Springer
137views Education» more  CORR 2002»
13 years 7 months ago
On ASGS framework: general requirements and an example of implementation
: In the paper we propose general framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying secret sharing scheme. ASGS allows to preven...
Kamil Kulesza, Zbigniew Kotulski
IEICET
2006
80views more  IEICET 2006»
13 years 7 months ago
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru...
IJNSEC
2006
111views more  IJNSEC 2006»
13 years 7 months ago
Ideal Secret Sharing Schemes from Permutations
The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restri...
Josef Pieprzyk, Xian-Mo Zhang
SCN
2008
Springer
128views Communications» more  SCN 2008»
13 years 7 months ago
On Linear Secret Sharing for Connectivity in Directed Graphs
In this work we study linear secret sharing schemes for s-t connectivity in directed graphs. In such schemes the parties are edges of a complete directed graph, and a set of partie...
Amos Beimel, Anat Paskin