Sciweavers

380 search results - page 7 / 76
» Intrusion-Resilient Secret Sharing
Sort
View
CORR
2010
Springer
90views Education» more  CORR 2010»
15 years 12 days ago
Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing
— We consider perfect secret key generation for a “pairwise independent network” model in which every pair of terminals share a random binary string, with the strings shared ...
Sirin Nitinawarat, Prakash Narayan
IJNSEC
2006
111views more  IJNSEC 2006»
15 years 1 months ago
Ideal Secret Sharing Schemes from Permutations
The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restri...
Josef Pieprzyk, Xian-Mo Zhang
115
Voted
SCN
2008
Springer
128views Communications» more  SCN 2008»
15 years 1 months ago
On Linear Secret Sharing for Connectivity in Directed Graphs
In this work we study linear secret sharing schemes for s-t connectivity in directed graphs. In such schemes the parties are edges of a complete directed graph, and a set of partie...
Amos Beimel, Anat Paskin
IJISEC
2002
58views more  IJISEC 2002»
15 years 1 months ago
A complete characterization of a family of key exchange protocols
Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a one-bit secret key which is informationtheoretically secure from t...
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
135
Voted
ICISC
2008
88views Cryptology» more  ICISC 2008»
15 years 3 months ago
Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images
We consider a visual secret sharing scheme with cyclic access structure for n secret images and n shares, where two consecutive shares decode one secret image. This secret sharing ...
Miyuki Uno, Mikio Kano