Sciweavers

56 search results - page 2 / 12
» Secret Sharing Made Short
Sort
View
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 8 days ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
CRYPTO
2006
Springer
111views Cryptology» more  CRYPTO 2006»
13 years 10 months ago
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
We address the message authentication problem in two seemingly different communication models. In the first model, the sender and receiver are connected by an insecure channel and...
Moni Naor, Gil Segev, Adam Smith
TCC
2010
Springer
176views Cryptology» more  TCC 2010»
14 years 3 months ago
Ideal Hierarchical Secret Sharing Schemes
The search of efficient constructions of ideal secret sharing schemes for families of nonthreshold access structures that may have useful applications has attracted a lot of atten...
Oriol Farràs, Carles Padró
ICIP
2008
IEEE
14 years 22 days ago
A novel video encryption technique based on secret sharing
The rapid growth of the Internet and digitized content made video distribution simpler. Hence the need for video data protection is on the rise. In this paper, we propose a secure...
Chigullapally Narsimha Raju, Ganugula Umadevi, Kan...
ACNS
2006
Springer
92views Cryptology» more  ACNS 2006»
14 years 8 days ago
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing
The visual secret sharing (VSS for short) scheme is a secret image sharing scheme. A secret image is visually revealed from overlapping shadow images without additional computation...
Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen