Sciweavers

225 search results - page 11 / 45
» Nonperfect Secret Sharing Schemes
Sort
View
ISCI
2010
79views more  ISCI 2010»
14 years 10 months ago
Strong (n, t, n) verifiable secret sharing scheme
Lein Harn, Changlu Lin
INFOCOM
1997
IEEE
15 years 4 months ago
Secret Sharing in Graph-Based Prohibited Structures
A secret sharing schemefor the prohibited structure is a method of sharing a master key among a finite set of participants in such a way that only certain pre-specified subsetsof ...
Hung-Min Sun, Shiuh-Pyng Shieh
CG
2002
Springer
14 years 11 months ago
Secret image sharing
Abstract. We present a novel hybrid method that includes a modulated scheme for reducing the distortion of the reconstructed image and a two-layered structure for grouping particip...
Chih-Ching Thien, Ja-Chen Lin
STORAGESS
2005
ACM
15 years 5 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough