Sciweavers

225 search results - page 11 / 45
» Nonperfect Secret Sharing Schemes
Sort
View
70
Voted
ISCI
2010
79views more  ISCI 2010»
15 years 8 days ago
Strong (n, t, n) verifiable secret sharing scheme
Lein Harn, Changlu Lin
128
Voted
INFOCOM
1997
IEEE
15 years 6 months ago
Secret Sharing in Graph-Based Prohibited Structures
A secret sharing schemefor the prohibited structure is a method of sharing a master key among a finite set of participants in such a way that only certain pre-specified subsetsof ...
Hung-Min Sun, Shiuh-Pyng Shieh
95
Voted
CG
2002
Springer
15 years 1 months ago
Secret image sharing
Abstract. We present a novel hybrid method that includes a modulated scheme for reducing the distortion of the reconstructed image and a two-layered structure for grouping particip...
Chih-Ching Thien, Ja-Chen Lin
159
Voted
STORAGESS
2005
ACM
15 years 7 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough