Sciweavers

241 search results - page 2 / 49
» On Proactive Secret Sharing Schemes
Sort
View
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 5 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta
IEICET
2006
80views more  IEICET 2006»
13 years 5 months ago
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru...
IJNSEC
2006
111views more  IJNSEC 2006»
13 years 5 months ago
Ideal Secret Sharing Schemes from Permutations
The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restri...
Josef Pieprzyk, Xian-Mo Zhang
CRYPTO
1995
Springer
100views Cryptology» more  CRYPTO 1995»
13 years 8 months ago
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, M...
TISSEC
2010
104views more  TISSEC 2010»
12 years 12 months ago
MPSS: Mobile Proactive Secret Sharing
David A. Schultz, Barbara Liskov, Moses Liskov