• 沒有找到結果。

[PDF] Top 20 A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

Has 10000 "A Generalized Secret Sharing Scheme Realizing Ordered Access Structures" found on our website. Below are the top 20 most common "A Generalized Secret Sharing Scheme Realizing Ordered Access Structures".

A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

... propose a novel generalized secret sharing scheme that realizes an ordered access structure, in which the participants of a qualified subset can reconstruct the ... See full document

3

Constructing perfect secret sharing schemes for general and uniform access structures

Constructing perfect secret sharing schemes for general and uniform access structures

... ssp@csie.nctu.edu.tw A perfect secret sharing scheme allows a secret K to be shared among a set of partici- pants in such a way that only qualified subsets of ... See full document

11

A Multi-threshold Secret Image Sharing Scheme Based on MSP

A Multi-threshold Secret Image Sharing Scheme Based on MSP

... proposed scheme is fea- sible and that it also can achieve both the high visual quality of the shadow images and high embedding ...efficient secret sharing scheme for every given ac- cess ...up ... See full document

7

The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures

The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures

... Abstract A perfect secret-sharing scheme is a method of distributing a secret among a set of participants such that only qualified subsets of participants can ... See full document

10

A Multi-Use Secure and Efficient Multi-Secret Images Sharing Scheme for General Access Structure

A Multi-Use Secure and Efficient Multi-Secret Images Sharing Scheme for General Access Structure

... 一、 、 、 、簡介 簡介 簡介 簡介 隨著網路的蓬勃發展,人們愈來愈依賴網路 來傳播資訊,但在傳遞機密資料的過程中,機密 資料若被惡意的攻擊者所擷取,則會導致企業嚴 重的損失或是國家安全遭受威脅。因此,資料傳 輸的安全性也愈來愈受重視。為了保護機密資料 洩漏的問題,機密資料的擁有者常事先將資料進 行加密,再傳送之。之後,即使傳送中的資料被 竊取,仍無法得知機密資料的任何相關資訊。在 1979 年, Blakley [2] 和 ... See full document

9

A Scheme for Threshold Multi-Secret Sharing

A Scheme for Threshold Multi-Secret Sharing

... 名: A Scheme for Threshold Multi-Secret Sharing 作者: Chan, ...關鍵詞: Access structure;Basis of access structure;The Chinese remainder ... See full document

1

A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy

A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy

... reconstructed grayscale image quality than Wang et al.'s scheme without significantly increasing computational complexity, we apply the voting strategy and the least significant bits a[r] ... See full document

1

Secret sharing schemes for graph-based prohibited structures

Secret sharing schemes for graph-based prohibited structures

... Brickell and Stinson [5] studied a perfect secret sharing scheme for graph-based access structure F where the monotone-increasing access structure F contains the pairs of partic[r] ... See full document

10

A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce

A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce

... even access various network ...is a challenge for mobile devices that have limited computational ...propose a server-aided signature scheme based on secret sharing for mobile ... See full document

10

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

... threshold secret-sharing ...given a weight depending on his or her position in an organization. A set of participants is in the access structure if and only if the sum of the weights of ... See full document

12

Two-Level Threshold Secret Sharing Scheme and Monotone Functions

Two-Level Threshold Secret Sharing Scheme and Monotone Functions

... compartmented access structure was studied where the users are as- signed to different groups and share the secret in two levels, the first level is global level and the second, compartment ...The ... See full document

6

Multi-level visual secret sharing scheme with Smooth-Looking

Multi-level visual secret sharing scheme with Smooth-Looking

... Visual secret sharing - Visual secret sharing schemes Classification code:943 Mechanical and Miscellaneous Measuring Instruments - 942 Electric and Electronic Measuring Instruments - 941 ... See full document

2

A hierarchical threshold secret image sharing

A hierarchical threshold secret image sharing

... their scheme, the secret is shared by a set of participants partitioned into several levels, and the secret data can be reconstructed by satisfying a sequence of threshold require- ... See full document

9

A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation

A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation

... - A copyright protection scheme for gray- level images based on image secret sharing and wavelet transformation is proposed in this ...The scheme contains a secret image ... See full document

6

An efficient construction of perfect secret sharing schemes for graph-based structures

An efficient construction of perfect secret sharing schemes for graph-based structures

... Brick- ell and Stinson studied a perfect secret sharing scheme for a graph-based structure where the monotone-increasing access structure F contains the pairs of p[r] ... See full document

7

An Efficient Probability-based t out of n Secret Image Sharing Scheme

An Efficient Probability-based t out of n Secret Image Sharing Scheme

... the secret pixels to blocks. As a result, the size of the secret image becomes larger, and the quality of the expanded secret image becomes ...visual secret sharing ... See full document

1

Sharing a Verifiable Secret Image Using Two Shadows

Sharing a Verifiable Secret Image Using Two Shadows

... propose a novel (2,2) verifiable secret sharing (VSS) scheme, which not only protects a secret image but also allows users to verify the restored secret image in the ... See full document

1

A Patch Protocol for SHK Secret Transfer Scheme

A Patch Protocol for SHK Secret Transfer Scheme

... transfer a secret to Bob securely such that bob cannot decrypt the secret unless a group of trustees ...follow a prescribed protocol, the com- munication channels are ...the ... See full document

7

ROBUST COPYRIGHT PROTECTION SCHEME FOR MEDICAL IMAGES BASED ON DWT, SVD, AND SECRET SHARING TECHNIQUES

ROBUST COPYRIGHT PROTECTION SCHEME FOR MEDICAL IMAGES BASED ON DWT, SVD, AND SECRET SHARING TECHNIQUES

... LQ WKLV VWXG\  7KH PHGLFDO LPDJH DQG WKH ZDWHUPDUN. VKRZQLQ)LJV D DQG D UHVSHFWLYHO\ZHUHXVHGLQWKH[r] ... See full document

13

A probability model for reconstructing secret sharing under the internet environment

A probability model for reconstructing secret sharing under the internet environment

... A share spanning tree that connects the root node (the user that recreates the secret under consideration) to some other nodes such that its vertices hold all [r] ... See full document

19

Show all 10000 documents...