Sciweavers

101
Voted
IJNSEC
2006
111views more  IJNSEC 2006»
15 years 13 days ago
Ideal Secret Sharing Schemes from Permutations
The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restri...
Josef Pieprzyk, Xian-Mo Zhang