Sciweavers

10 search results - page 1 / 2
» Strong (n, t, n) verifiable secret sharing scheme
Sort
View
ISCI
2010
79views more  ISCI 2010»
13 years 3 months ago
Strong (n, t, n) verifiable secret sharing scheme
Lein Harn, Changlu Lin
FCS
2006
13 years 6 months ago
A Verifiable and Detectable Secret Sharing Scheme by Using a New Geometric Approach
Secret sharing schemes are methods for distributing a secret among n participants in such a way that any qualified subsets of participants can recover the secret, and unqualified ...
Justie Su-tzu Juan, Yu-Lin Chuang
CRYPTO
2009
Springer
111views Cryptology» more  CRYPTO 2009»
13 years 9 months ago
The Round Complexity of Verifiable Secret Sharing Revisited
The round complexity of interactive protocols is one of their most important complexity measures. In this work we prove that existing lower bounds for the round complexity of VSS c...
Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pand...
ICMCS
2007
IEEE
136views Multimedia» more  ICMCS 2007»
13 years 11 months ago
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image
Some (k, n)-threshold image secret sharing schemes encrypt the secret image into n noise-like shadow images with size 1/k times that of the original secret image. The small size o...
Ching-Nung Yang, Tse-Shih Chen
EUROCRYPT
2000
Springer
13 years 8 months ago
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) f...
Ronald Cramer, Ivan Damgård, Ueli M. Maurer