Sciweavers

380 search results - page 2 / 76
» Intrusion-Resilient Secret Sharing
Sort
View
JDCTA
2010
250views more  JDCTA 2010»
13 years 1 months ago
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Thekra Abbas, Zou Beiji
COMCOM
1999
79views more  COMCOM 1999»
13 years 6 months ago
On-line multiple secret sharing based on a one-way function
Based on a one-way function and the intractability of the Diffie
Hung-Min Sun
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
13 years 4 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
CORR
2002
Springer
122views Education» more  CORR 2002»
13 years 6 months ago
On alternative approach for verifiable secret sharing
The proposed approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants. T...
Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
DAM
2002
72views more  DAM 2002»
13 years 6 months ago
On the bound for anonymous secret sharing schemes
In anonymous secret sharing schemes, the secret can be reconstructed without knowledge of which participants hold which shares. In this paper, we derive a tighter lower bound on t...
Wataru Kishimoto, Koji Okada, Kaoru Kurosawa, Waka...