• No results found

sharing schemes

Simple and Efficient Secret Sharing Schemes for          Sharing Data and Image

Simple and Efficient Secret Sharing Schemes for Sharing Data and Image

... Abstract—Secret sharing is a new alternative for outsourcing data in a secure ...Secret sharing based solution provides secure information dispersal by making shares of the original data and distributes ...

6

A novel quality assessment for visual secret sharing schemes

A novel quality assessment for visual secret sharing schemes

... secret sharing schemes, most of the existing metrics fail to generate fair and uniform quality scores for tested reconstructed ...secret sharing, detecting outstanding local features and global ...

15

A Survey on Various Visual Secret Sharing Schemes with an Application

A Survey on Various Visual Secret Sharing Schemes with an Application

... secret sharing by random ...image sharing schemes which is based on the Random Grids ...secret sharing by random grids to enhance it to the extent of basic 2-out-of-2 scheme to the n-out-of-n ...

5

Secret  Sharing  Schemes  Based  on  Resilient  Boolean  Maps

Secret Sharing Schemes Based on Resilient Boolean Maps

... secret sharing schemes (VSSSS) [4], and the modifications in [17], to diminish the risk of ...ramp schemes are built whose secrets are vector of field elements, producing non-perfect ...

16

Robust  Secret  Sharing  Schemes  Against  Local  Adversaries

Robust Secret Sharing Schemes Against Local Adversaries

... secret sharing schemes in the standard model: in order to achieve robustness we use Shamir’s secret sharing scheme and expand each share with some authentication data so that any adversary who ...

30

Secret  Sharing  Schemes  with  General  Access  Structures (Full  version)

Secret Sharing Schemes with General Access Structures (Full version)

... Secret sharing scheme is also a key tool for secure multiparty computation (MPC) (see ...secret sharing scheme, then the players in a qualified group can compute the result of the agreed function, and the ...

23

A Study on Multisecret-Sharing Schemes Based on Linear Codes

A Study on Multisecret-Sharing Schemes Based on Linear Codes

... Secret sharing schemes have been working ...multisecret-sharing schemes over finite fields in Çalkavur and Solé (2020) ...Secret sharing schemes based on extension fields were ...

9

Secret Sharing Schemes Based on Extension Fields

Secret Sharing Schemes Based on Extension Fields

... The material is organized as follows. Section II contains some algebraic background. Section III describes the schemes and analyses their security. We also determine the access structure of these secret ...

7

Asymptotically  Ideal  CRT-based  Secret  Sharing  Schemes  for  Multilevel   and  Compartmented  Access  Structures

Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures

... secret sharing scheme with public ...secret sharing schemes for disjunctive and conjunctive multilevel, and compartmented, access ...secret sharing scheme with other threshold secret ...

27

Efficient  Threshold  Secret  Sharing  Schemes  Secure  against  Rushing  Cheaters

Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters

... As in the ordinary (k, n) secret sharing schemes, the model of robust secret sharing scheme against rushing cheaters consists of two algorithms. A share generation algo- rithm ShareGen is the same as ...

23

Finding  Lower  Bounds  on  the  Complexity  of  Secret  Sharing  Schemes  by  Linear  Programming

Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming

... In this paper, we present several results on the optimization of the (average) complexity of secret sharing schemes that have been obtained by using linear programming. Other results by using the same ...

19

Construction  of  Arithmetic  Secret  Sharing  Schemes  by  Using   Torsion  Limits

Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits

... arithmetic schemes are investifated and the results are ...secret sharing schemes with uniformity in Section ...secret sharing schemes in Section ...

17

Secret  Sharing  Schemes  for  Very  Dense  Graphs

Secret Sharing Schemes for Very Dense Graphs

... secret-sharing schemes for general access structures, there are gaps between the known lower bounds and upper bounds on the share size for ...secret-sharing schemes (that is, require large ...

20

Extending  Brickell-Davenport  Theorem  to  Non-Perfect  Secret  Sharing  Schemes

Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes

... secret sharing schemes that are not necessarily perfect, that is, schemes in which some unqualified sets may obtain partial information about the secret ...secret sharing schemes whose ...

16

Are bicycle sharing schemes socially inclusive?

Are bicycle sharing schemes socially inclusive?

... bicycle sharing schemes are unevenly dis- tributed across socio-demographic groups (Ricci, 2015), it is not clear whether this is because the schemes themselves are unevenly distributed, spatially ...

17

An Explication of Multifarious Secret Sharing Schemes

An Explication of Multifarious Secret Sharing Schemes

... secret sharing is to start with a secret, divide it into pieces called shares, which are then distributed amongst participants by the ...secret sharing schemes seem to be getting more important ...

5

A Review on Visual Secret Sharing Schemes

A Review on Visual Secret Sharing Schemes

... secret sharing scheme is a powerful technique to encode the original secret into two or more shadow images or share ...secret sharing schemes such as visual cryptography based schemes, random ...

5

Visual Secret Sharing Schemes for QR Code

Visual Secret Sharing Schemes for QR Code

... secret sharing scheme, where an image was broken up into n shares so that only someone with all n shares could decrypt the image, while any n − 1 shares revealed no information about the original ...CRYPTOGRAPHY ...

5

Security  of  Linear  Secret-Sharing  Schemes  against  Mass  Surveillance

Security of Linear Secret-Sharing Schemes against Mass Surveillance

... Related Work. Kleptography was introduced by Young and Yung in the 90s to consider undetectable modifications to cryptosystems that deliberately provide trapdoor capabilities [7, 8], as an extension to the existing ...

17

The Establishment of Employer Based Car Sharing Schemes in West Yorkshire.

The Establishment of Employer Based Car Sharing Schemes in West Yorkshire.

... KIRBY "Microsimulation of organised car sharing - model predictions and policy implications", Leeds University, Institute for Transport Studies, WP 114, 1979 To be published as TRRL SR 5[r] ...

41

Show all 9150 documents...

Related subjects