Sciweavers

225 search results - page 2 / 45
» Nonperfect Secret Sharing Schemes
Sort
View
CORR
2010
Springer
171views Education» more  CORR 2010»
14 years 11 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta
IEICET
2006
80views more  IEICET 2006»
14 years 11 months ago
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru...
IJNSEC
2006
111views more  IJNSEC 2006»
14 years 11 months ago
Ideal Secret Sharing Schemes from Permutations
The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restri...
Josef Pieprzyk, Xian-Mo Zhang
ICISC
2008
88views Cryptology» more  ICISC 2008»
15 years 1 months ago
Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images
We consider a visual secret sharing scheme with cyclic access structure for n secret images and n shares, where two consecutive shares decode one secret image. This secret sharing ...
Miyuki Uno, Mikio Kano
SCN
2008
Springer
128views Communications» more  SCN 2008»
14 years 11 months ago
On Linear Secret Sharing for Connectivity in Directed Graphs
In this work we study linear secret sharing schemes for s-t connectivity in directed graphs. In such schemes the parties are edges of a complete directed graph, and a set of partie...
Amos Beimel, Anat Paskin