Sciweavers

241 search results - page 2 / 49
» On Proactive Secret Sharing Schemes
Sort
View
102
Voted
CORR
2010
Springer
171views Education» more  CORR 2010»
14 years 11 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta
IEICET
2006
80views more  IEICET 2006»
14 years 11 months ago
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru...
90
Voted
IJNSEC
2006
111views more  IJNSEC 2006»
14 years 11 months ago
Ideal Secret Sharing Schemes from Permutations
The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restri...
Josef Pieprzyk, Xian-Mo Zhang
CRYPTO
1995
Springer
100views Cryptology» more  CRYPTO 1995»
15 years 3 months ago
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, M...
83
Voted
TISSEC
2010
104views more  TISSEC 2010»
14 years 6 months ago
MPSS: Mobile Proactive Secret Sharing
David A. Schultz, Barbara Liskov, Moses Liskov