Sciweavers

391 search results - page 4 / 79
» On-Line Secret Sharing
Sort
View
ICISC
2008
88views Cryptology» more  ICISC 2008»
13 years 9 months ago
Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images
We consider a visual secret sharing scheme with cyclic access structure for n secret images and n shares, where two consecutive shares decode one secret image. This secret sharing ...
Miyuki Uno, Mikio Kano
ASIACRYPT
2006
Springer
13 years 11 months ago
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
We consider the problem of cheating in secret sharing schemes, cheating in which individuals submit forged shares in the secret reconstruction phase in an effort to make another pa...
Satoshi Obana, Toshinori Araki
ICMCS
2007
IEEE
136views Multimedia» more  ICMCS 2007»
14 years 1 months ago
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image
Some (k, n)-threshold image secret sharing schemes encrypt the secret image into n noise-like shadow images with size 1/k times that of the original secret image. The small size o...
Ching-Nung Yang, Tse-Shih Chen
JDCTA
2010
250views more  JDCTA 2010»
13 years 2 months ago
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Thekra Abbas, Zou Beiji
COMCOM
1999
79views more  COMCOM 1999»
13 years 7 months ago
On-line multiple secret sharing based on a one-way function
Based on a one-way function and the intractability of the Diffie
Hung-Min Sun