Results 81 to 90 of about 375,511 (221)

Anonymous secret sharing schemes

open access: yesDiscrete Applied Mathematics, 1997
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Douglas R. Stinson, Carlo Blundo
openaire   +3 more sources

Secret Image Sharing Scheme Based on a Boolean Operation

open access: yesCybernetics and Information Technologies, 2014
Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction
Nag Amitava   +3 more
doaj   +1 more source

Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract) [PDF]

open access: yes, 2007
In 1979, Blackley and Shamir independently proposed schemes by which a secret can be divided into many shares which can be distributed to mutually suspicious agents. This paper describes a homomorphism property attained by these and several other secret sharing schemes which allows multiple secrets to be combined by direct computation on shares.
openaire   +2 more sources

Gruppen secret sharing or how to share several secrets if you must? [PDF]

open access: yesMathematica Slovaca, 2013
Abstract Each member of an n-person team has a secret, say a password. The k out of n gruppen secret sharing requires that any group of k members should be able to recover the secrets of the other n − k members, while any group of k − 1 or less members should have no information on the secret of other team member even if other secrets ...
openaire   +3 more sources

Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Secret sharing is an important aspect of key management in wireless ad hoc and sensor networks. In this paper, we define a new secure model of secret sharing, use the Lagrange interpolation and the bilinear cyclic groups to construct an efficient ...
Yuanju Gan   +4 more
doaj   +1 more source

Verifiable multi-secret sharing schemes applicable to arbitrary access structures

open access: yesTongxin xuebao, 2007
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj   +2 more sources

Multiple assignment scheme for sharing secret [PDF]

open access: bronze, 1993
Mitsuru Ito   +2 more
openalex   +1 more source

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES [PDF]

open access: yes
Visual secret sharing schemes (VSS) represent an important concept of visual cryptography. They permit the sharing of a secret image between multiple participants so that only authorized groups can recover the secret.
Ruxandra Olimid
core  

Home - About - Disclaimer - Privacy