Sciweavers

977 search results - page 6 / 196
» Secret image sharing
Sort
View
AINA
2005
IEEE
14 years 1 months ago
Dynamic Key Generations for Secret Sharing in Access Structures
In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen
ASIACRYPT
1992
Springer
13 years 11 months ago
Nonperfect Secret Sharing Schemes
: Nonperfect secret sharing schemes NSSs have an advantage such that the size of shares can be shorter than that of perfect secret sharing schemes. This paper shows some basic prop...
Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii
EUROPKI
2007
Springer
14 years 1 months ago
On Partial Anonymity in Secret Sharing
Abstract. Anonymous secret sharing schemes allow a secret to be recovered from shares regardless of the identity of shareholders. Besides being interesting in its own right, this p...
Vanesa Daza, Josep Domingo-Ferrer
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
13 years 5 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
CORR
2002
Springer
122views Education» more  CORR 2002»
13 years 7 months ago
On alternative approach for verifiable secret sharing
The proposed approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants. T...
Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk