Sciweavers

101 search results - page 7 / 21
» Extended visual cryptography schemes
Sort
View
VIS
2009
IEEE
300views Visualization» more  VIS 2009»
15 years 10 months ago
Predictor-Corrector Schemes for Visualization of Smoothed Particle Hydrodynamics Data
Abstract--In this paper we present a method for vortex core line extraction which operates directly on the smoothed particle hydrodynamics (SPH) representation and, by this, genera...
Benjamin Schindler, Raphael Fuchs, John Biddisco...
EUROCRYPT
2004
Springer
15 years 3 months ago
Chosen-Ciphertext Security from Identity-Based Encryption
Abstract. We propose a simple and efficient construction of a CCAsecure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme. Our construction re...
Ran Canetti, Shai Halevi, Jonathan Katz
JISE
2008
143views more  JISE 2008»
14 years 9 months ago
A Geometry-Based Secret Image Sharing Approach
This paper solves the visual cryptography problem by the Blakley scheme that is a geometry-based secret sharing strategy. We first partition the protected image into non-overlappi...
Chien-Chang Chen, Wen-Yin Fu
PKC
2007
Springer
129views Cryptology» more  PKC 2007»
15 years 3 months ago
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert threemove identification protocols into two-tier signatur...
Mihir Bellare, Sarah Shoup
VL
1990
IEEE
110views Visual Languages» more  VL 1990»
15 years 1 months ago
A Declarative Formalism for Specifying Graphical Layout
This paper describes a new approach to specifying graphical layouts of arbitrary objects, which is based on a TEXlike notation. Our simplest scheme offers specifications similar t...
Volker Haarslev, Ralf Möller