Sciweavers

977 search results - page 19 / 196
» Secret image sharing
Sort
View
CRYPTO
2009
Springer
111views Cryptology» more  CRYPTO 2009»
14 years 13 days ago
The Round Complexity of Verifiable Secret Sharing Revisited
The round complexity of interactive protocols is one of their most important complexity measures. In this work we prove that existing lower bounds for the round complexity of VSS c...
Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pand...
SSWMC
2004
13 years 10 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
ASIACRYPT
2004
Springer
14 years 1 months ago
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Abstract. We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between...
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
SIGMOD
2004
ACM
105views Database» more  SIGMOD 2004»
14 years 8 months ago
Share your data, Keep your secrets
Irini Fundulaki, Arnaud Sahuguet
TCC
2010
Springer
303views Cryptology» more  TCC 2010»
14 years 5 months ago
Efficient Rational Secret Sharing in Standard Communication Networks
Georg Fuchsbauer, Jonathan Katz, David Naccache