Sciweavers

JCM
2007
82views more  JCM 2007»
13 years 10 months ago
Secret Sharing Schemes With General Access Structure Based On MSPs
— In this paper we introduce two operations of access structure to build large monotone span programs MSPs from small MSPs. Furthermore, we point out a new method of constructing...
Jun Xu, Xiaomin Zha
JCP
2008
161views more  JCP 2008»
13 years 11 months ago
Visual Cryptography for General Access Structure Using Pixel-block Aware Encoding
Multi-pixel encoding is an emerging method in visual cryptography for that it can encode more than one pixel for each encoding run. Nevertheless, in fact its encoding efficiency is...
Haibo Zhang, Xiaofei Wang, Wanhua Cao, Youpeng Hua...
INDOCRYPT
2003
Springer
14 years 4 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
14 years 5 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin