• 沒有找到結果。

[PDF] Top 20 An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme

Has 10000 "An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme" found on our website. Below are the top 20 most common "An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme".

An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme

An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme

... Abstract Lin and Wu [IEE ...proposed an efficient ðt; nÞ threshold verifiable multi-secret sharing (VMSS) scheme based on the factorization ... See full document

10

A Scheme for Threshold Multi-Secret Sharing

A Scheme for Threshold Multi-Secret Sharing

... A Scheme for Threshold Multi-Secret Sharing 作者: Chan, ...theorem;Distinctness;Entropy;Idealness;Multi-secret sharing scheme;Perfectness;The Shamir ... See full document

1

A Multi-threshold Secret Image Sharing Scheme Based on MSP

A Multi-threshold Secret Image Sharing Scheme Based on MSP

... simplify the proposed scheme, we used a simple 3-LSB substitu- tion to embed shadow data into the cover ...Since the corre- sponding shadow data are real numbers, we divided these shadow data ... See full document

7

A hierarchical threshold secret image sharing

A hierarchical threshold secret image sharing

... hierarchical threshold characteristic as compared with the existing secret image sharing ...compares the functionality of the proposed scheme with that of related ...2, ... See full document

9

Fast-weighted secret image sharing

Fast-weighted secret image sharing

... and Lin 关Comput. and Graphics 26共5兲, 765–770 共2002兲兴 proposed a threshold scheme to share a secret image among n shad- ows: any t of the n shadows can recover ... See full document

7

Secret Image Hiding and Sharing Based on the (t, n)-Threshold

Secret Image Hiding and Sharing Based on the (t, n)-Threshold

... (3) sharing the n shadows among n cover ...and secret image quality preservation effects and to limit the size of each shadow image down to 1/t of that of the ... See full document

1

An Efficient Probability-based t out of n Secret Image Sharing Scheme

An Efficient Probability-based t out of n Secret Image Sharing Scheme

... presented the concept of visual ...down the same track: to expand the secret pixels to ...result, the size of the secret image becomes larger, and the quality of ... See full document

1

Two-Level Threshold Secret Sharing Scheme and Monotone Functions

Two-Level Threshold Secret Sharing Scheme and Monotone Functions

... In the paper [Ift06], the compartmented access structure was studied where the users are as- signed to different groups and share the secret in two levels, the first level is ... See full document

6

Sharing a Verifiable Secret Image Using Two Shadows

Sharing a Verifiable Secret Image Using Two Shadows

... (2,2) verifiable secret sharing (VSS) scheme, which not only protects a secret image but also allows users to verify the restored secret image in the revealing and ... See full document

1

Multi-level visual secret sharing scheme with Smooth-Looking

Multi-level visual secret sharing scheme with Smooth-Looking

... Visual secret sharing - Visual secret sharing schemes Classification code:943 Mechanical and Miscellaneous Measuring Instruments - 942 Electric and Electronic Measuring Instruments - 941 ... See full document

2

On the (2,2) Visual Multi-Secret Sharing Schemes

On the (2,2) Visual Multi-Secret Sharing Schemes

... Abstract The concept of visual secret sharing (VSS) scheme was first proposed by Noar and Shamir in ...a secret image into several meaningless images, called shadows, such that certain ... See full document

8

A Multi-Use Secure and Efficient Multi-Secret Images Sharing Scheme for General Access Structure

A Multi-Use Secure and Efficient Multi-Secret Images Sharing Scheme for General Access Structure

... 一、 、 、 、簡介 簡介 簡介 簡介 隨著網路的蓬勃發展,人們愈來愈依賴網路 來傳播資訊,但在傳遞機密資料的過程中,機密 資料若被惡意的攻擊者所擷取,則會導致企業嚴 重的損失或是國家安全遭受威脅。因此,資料傳 輸的安全性也愈來愈受重視。為了保護機密資料 洩漏的問題,機密資料的擁有者常事先將資料進 行加密,再傳送之。之後,即使傳送中的資料被 竊取,仍無法得知機密資料的任何相關資訊。在 1979 年, Blakley [2] 和 ... See full document

9

An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities

An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities

... 摘要: Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on the RSA cryptosystem.. Later, Wang et al.[r] ... See full document

1

A Novel Efficient (t,n) Threshold Proxy Signature Scheme

A Novel Efficient (t,n) Threshold Proxy Signature Scheme

... proposed threshold proxy signature schemes have been based on discrete logarithms required for a protocol to generate and verify a shared secret among the proxy ...for the proxy signers ... See full document

1

A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce

A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce

... With the progress of the mobile communication technology and the popularity of the handheld de- vices, mobile commerce is of great importance ...When the requested services need to be ... See full document

10

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

... considered the weighted threshold secret-sharing ...is the case when every participant is given a weight depending on his or her position in an ...in the access ... See full document

12

A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

... ABSTRACT The authors propose a novel generalized secret sharing scheme that realizes an ordered access structure, in which the participants of a qualified subset can reconstruct ... See full document

3

Strategies of Proactive (k, n) Threshold Secret Sharing and Applications in a Secure Message Exchange System

Strategies of Proactive (k, n) Threshold Secret Sharing and Applications in a Secure Message Exchange System

... discuss the security of our scheme. During every translating period, the previous shadow is changed by adding a random number which is generated from k selected nodes, the same as table C, and ... See full document

10

ROBUST COPYRIGHT PROTECTION SCHEME FOR MEDICAL IMAGES BASED ON DWT, SVD, AND SECRET SHARING TECHNIQUES

ROBUST COPYRIGHT PROTECTION SCHEME FOR MEDICAL IMAGES BASED ON DWT, SVD, AND SECRET SHARING TECHNIQUES

... LQ WKLV VWXG\  7KH PHGLFDO LPDJH DQG WKH ZDWHUPDUN. VKRZQLQ)LJV D DQG D UHVSHFWLYHO\ZHUHXVHGLQWKH[r] ... See full document

13

A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation

A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation

... protection scheme for gray- level images based on image secret sharing and wavelet transformation is proposed in this ...paper. The scheme contains a secret image ... See full document

6

Show all 10000 documents...