Sciweavers

225 search results - page 1 / 45
» Weakly-Private Secret Sharing Schemes
Sort
View
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
13 years 10 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 4 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta
IEICET
2006
80views more  IEICET 2006»
13 years 4 months ago
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru...
IJNSEC
2006
111views more  IJNSEC 2006»
13 years 4 months ago
Ideal Secret Sharing Schemes from Permutations
The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restri...
Josef Pieprzyk, Xian-Mo Zhang
ICISC
2008
88views Cryptology» more  ICISC 2008»
13 years 6 months ago
Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images
We consider a visual secret sharing scheme with cyclic access structure for n secret images and n shares, where two consecutive shares decode one secret image. This secret sharing ...
Miyuki Uno, Mikio Kano