Top PDF An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme

An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme

An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme

... Abstract Lin and Wu [IEE ...proposed an efficient ðt; nÞ threshold verifiable multi-secret sharing (VMSS) scheme based on the factorization ...

10

A Scheme for Threshold Multi-Secret Sharing

A Scheme for Threshold Multi-Secret Sharing

... A Scheme for Threshold Multi-Secret Sharing 作者: Chan, ...theorem;Distinctness;Entropy;Idealness;Multi-secret sharing scheme;Perfectness;The Shamir ...

1

A Multi-threshold Secret Image Sharing Scheme Based on MSP

A Multi-threshold Secret Image Sharing Scheme Based on MSP

... simplify the proposed scheme, we used a simple 3-LSB substitu- tion to embed shadow data into the cover ...Since the corre- sponding shadow data are real numbers, we divided these shadow data ...

7

A hierarchical threshold secret image sharing

A hierarchical threshold secret image sharing

... hierarchical threshold characteristic as compared with the existing secret image sharing ...compares the functionality of the proposed scheme with that of related ...2, ...

9

Fast-weighted secret image sharing

Fast-weighted secret image sharing

... and Lin 关Comput. and Graphics 26共5兲, 765–770 共2002兲兴 proposed a threshold scheme to share a secret image among n shad- ows: any t of the n shadows can recover ...

7

Secret Image Hiding and Sharing Based on the (t, n)-Threshold

Secret Image Hiding and Sharing Based on the (t, n)-Threshold

... (3) sharing the n shadows among n cover ...and secret image quality preservation effects and to limit the size of each shadow image down to 1/t of that of the ...

1

An Efficient Probability-based t out of n Secret Image Sharing Scheme

An Efficient Probability-based t out of n Secret Image Sharing Scheme

... presented the concept of visual ...down the same track: to expand the secret pixels to ...result, the size of the secret image becomes larger, and the quality of ...

1

Two-Level Threshold Secret Sharing Scheme and Monotone Functions

Two-Level Threshold Secret Sharing Scheme and Monotone Functions

... In the paper [Ift06], the compartmented access structure was studied where the users are as- signed to different groups and share the secret in two levels, the first level is ...

6

Sharing a Verifiable Secret Image Using Two Shadows

Sharing a Verifiable Secret Image Using Two Shadows

... (2,2) verifiable secret sharing (VSS) scheme, which not only protects a secret image but also allows users to verify the restored secret image in the revealing and ...

1

Multi-level visual secret sharing scheme with Smooth-Looking

Multi-level visual secret sharing scheme with Smooth-Looking

... Visual secret sharing - Visual secret sharing schemes Classification code:943 Mechanical and Miscellaneous Measuring Instruments - 942 Electric and Electronic Measuring Instruments - 941 ...

2

On the (2,2) Visual Multi-Secret Sharing Schemes

On the (2,2) Visual Multi-Secret Sharing Schemes

... Abstract The concept of visual secret sharing (VSS) scheme was first proposed by Noar and Shamir in ...a secret image into several meaningless images, called shadows, such that certain ...

8

A Multi-Use Secure and Efficient Multi-Secret Images Sharing Scheme for General Access Structure

A Multi-Use Secure and Efficient Multi-Secret Images Sharing Scheme for General Access Structure

... 一、 、 、 、簡介 簡介 簡介 簡介 隨著網路的蓬勃發展,人們愈來愈依賴網路 來傳播資訊,但在傳遞機密資料的過程中,機密 資料若被惡意的攻擊者所擷取,則會導致企業嚴 重的損失或是國家安全遭受威脅。因此,資料傳 輸的安全性也愈來愈受重視。為了保護機密資料 洩漏的問題,機密資料的擁有者常事先將資料進 行加密,再傳送之。之後,即使傳送中的資料被 竊取,仍無法得知機密資料的任何相關資訊。在 1979 年, Blakley [2] 和 ...

9

An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities

An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities

... 摘要: Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on the RSA cryptosystem.. Later, Wang et al.[r] ...

1

A Novel Efficient (t,n) Threshold Proxy Signature Scheme

A Novel Efficient (t,n) Threshold Proxy Signature Scheme

... proposed threshold proxy signature schemes have been based on discrete logarithms required for a protocol to generate and verify a shared secret among the proxy ...for the proxy signers ...

1

A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce

A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce

... With the progress of the mobile communication technology and the popularity of the handheld de- vices, mobile commerce is of great importance ...When the requested services need to be ...

10

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

... considered the weighted threshold secret-sharing ...is the case when every participant is given a weight depending on his or her position in an ...in the access ...

12

A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

... ABSTRACT The authors propose a novel generalized secret sharing scheme that realizes an ordered access structure, in which the participants of a qualified subset can reconstruct ...

3

Strategies of Proactive (k, n) Threshold Secret Sharing and Applications in a Secure Message Exchange System

Strategies of Proactive (k, n) Threshold Secret Sharing and Applications in a Secure Message Exchange System

... discuss the security of our scheme. During every translating period, the previous shadow is changed by adding a random number which is generated from k selected nodes, the same as table C, and ...

10

ROBUST COPYRIGHT PROTECTION SCHEME FOR MEDICAL IMAGES BASED ON DWT, SVD, AND SECRET SHARING TECHNIQUES

ROBUST COPYRIGHT PROTECTION SCHEME FOR MEDICAL IMAGES BASED ON DWT, SVD, AND SECRET SHARING TECHNIQUES

... LQ WKLV VWXG\  7KH PHGLFDO LPDJH DQG WKH ZDWHUPDUN. VKRZQLQ)LJV D DQG D UHVSHFWLYHO\ZHUHXVHGLQWKH[r] ...

13

A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation

A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation

... protection scheme for gray- level images based on image secret sharing and wavelet transformation is proposed in this ...paper. The scheme contains a secret image ...

6

Show all 10000 documents...