Results 1 to 10 of about 3,153 (99)

Nonlinear Secret Image Sharing Scheme [PDF]

open access: yesThe Scientific World Journal, 2014
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
openaire   +3 more sources

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme [PDF]

open access: yesEURASIP Journal on Advances in Signal Processing, 2010
Abstract Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS) schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced.
Wang Daoshun, Yi Feng
openaire   +3 more sources

Universally ideal secret-sharing schemes [PDF]

open access: yesIEEE Transactions on Information Theory, 1994
Summary: Given a set of parties \(\{1, \dots, n\}\), an access structure is a monotone collection of subsets of the parties. For a certain domain of secrets, a secret-sharing scheme for an access structure is a method for a dealer to distribute shares to the parties.
Beimel, Amos, Chor, Benny
openaire   +3 more sources

Ideal Multipartite Secret Sharing Schemes [PDF]

open access: yesJournal of Cryptology, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Farràs, Oriol   +2 more
openaire   +3 more sources

Fully dynamic secret sharing schemes [PDF]

open access: yesTheoretical Computer Science, 1994
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blundo, Carlo   +3 more
openaire   +2 more sources

On Proactive Secret Sharing Schemes [PDF]

open access: yes, 2004
This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restriction to the adversary. We first investigate the approach of using commitment to 0 in the renewal phase in order to renew the player’s shares.
Nikov, V.S., Nikova, S.I.
openaire   +1 more source

Ideal Hierarchical Secret Sharing Schemes [PDF]

open access: yesIEEE Transactions on Information Theory, 2010
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention since the invention of secret sharing until nowadays. Several constructions of ideal hierarchical secret sharing schemes have been proposed, but it was not known what access structures admit such a scheme.
Farràs Ventura, Oriol   +1 more
openaire   +6 more sources

On identification secret sharing schemes

open access: yesInformation and Computation, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cai, N., Lam, K.Y.
openaire   +1 more source

Reusing Shares in Secret Sharing Schemes [PDF]

open access: yesThe Computer Journal, 1994
A (t, w) threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders is required in order to reconstruct the shared secret. This paper is concerned with the re-use of shares possessed by shareholders in threshold schemes.
Zheng, Yuliang   +2 more
openaire   +2 more sources

Generalized semiquantum secret-sharing schemes [PDF]

open access: yesPhysical Review A, 2012
Replaced by published version, typos ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy