• 沒有找到結果。

[PDF] Top 20 Secret sharing schemes for graph-based prohibited structures

Has 10000 "Secret sharing schemes for graph-based prohibited structures" found on our website. Below are the top 20 most common "Secret sharing schemes for graph-based prohibited structures".

Secret sharing schemes for graph-based prohibited structures

Secret sharing schemes for graph-based prohibited structures

... Brickell and Stinson [5] studied a perfect secret sharing scheme for graph-based access structure F where the monotone-increasing access structure F contains the pairs of partic[r] ... See full document

10

An efficient construction of perfect secret sharing schemes for graph-based structures

An efficient construction of perfect secret sharing schemes for graph-based structures

... Brick- ell and Stinson studied a perfect secret sharing scheme for a graph-based structure where the monotone-increasing access structure F contains the pairs of p[r] ... See full document

7

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

... threshold secret-sharing ...access structures based on graphs and studied their optimal information ...of secret sharing. We are motivated to construct better ... See full document

12

The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures

The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures

... perfect secret-sharing scheme is a method of distributing a secret among a set of participants such that only qualified subsets of participants can recover the secret and the joint shares of ... See full document

10

A Multi-threshold Secret Image Sharing Scheme Based on MSP

A Multi-threshold Secret Image Sharing Scheme Based on MSP

... efficient secret sharing scheme for every given ac- cess ...up secret image sharing schemes with generalized access structures has been lar- gely ignored by researchers in ... See full document

7

Constructing perfect secret sharing schemes for general and uniform access structures

Constructing perfect secret sharing schemes for general and uniform access structures

... XENIX for IBM, Federal Sector Division, Gaithersburg, Maryland, ...consultant for the Com- puter and Communications Laboratory, Industrial Technology Re- search Institute, Taiwan, in the area of network ... See full document

11

Recursive constructions for perfect secret sharing schemes

Recursive constructions for perfect secret sharing schemes

... Perfect Secret Sharing Schemes 89 In this paper, we propose some recursive constructions for perfect secret sharing schemes with access structures of constant rank.. Sti[r] ... See full document

10

A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

... generalized secret sharing scheme that realizes an ordered access structure, in which the participants of a qualified subset can reconstruct the shared secret only if they follow the sequence of ... See full document

3

Sharing Secret Image Based on Bit Plane

Sharing Secret Image Based on Bit Plane

... a secret sharing technique by encrypting m successively pixels to remove the problem of pixel ...halftone secret image is firstly divided into non-overlapping sections, in which every section ... See full document

6

On the (2,2) Visual Multi-Secret Sharing Schemes

On the (2,2) Visual Multi-Secret Sharing Schemes

... visual secret sharing (VSS) scheme was first proposed by Noar and Shamir in ...a secret image into several meaningless images, called shadows, such that certain qualified subsets of shadows can ... See full document

8

A Study of Bit-level Processing Based on Color  Imagines of Hierarchical Multiple Visual Secret Sharing Schemes and Applications

A Study of Bit-level Processing Based on Color Imagines of Hierarchical Multiple Visual Secret Sharing Schemes and Applications

... scheme was first proposed by Naor and Shamir in 1994; many secret sharing schemes were published afterward; one of them, the color images of hierarchical multiple visual secret shari[r] ... See full document

15

A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce

A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce

... challenge for mobile devices that have limited computational ...scheme based on secret sharing for mobile ...and secret sharing technology, we generate the cooperative ... See full document

10

A Scheme for Threshold Multi-Secret Sharing

A Scheme for Threshold Multi-Secret Sharing

... Scheme for Threshold Multi-Secret Sharing 作者: Chan, ...theorem;Distinctness;Entropy;Idealness;Multi-secret sharing scheme;Perfectness;The Shamir (t, n)-threshold secret ... See full document

1

Secret Sharing with Steganographic Effects for HTML Documents

Secret Sharing with Steganographic Effects for HTML Documents

... a secret HTML document are the components that can be displayed or be accessed on browsers, it is proposed in this study to share these components among participants of the secret HTML document by the ... See full document

7

New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel

New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel

... DEFINITION 2. A (k, n) NEVSS scheme can be shown as two collections C 0 and C 1 consisting of n λ and n γ n × 1 matrices, respectively. When sharing a white (resp. black) pixel, the dealer first randomly chooses ... See full document

12

ROBUST COPYRIGHT PROTECTION SCHEME FOR MEDICAL IMAGES BASED ON DWT, SVD, AND SECRET SHARING TECHNIQUES

ROBUST COPYRIGHT PROTECTION SCHEME FOR MEDICAL IMAGES BASED ON DWT, SVD, AND SECRET SHARING TECHNIQUES

... LQ WKLV VWXG\  7KH PHGLFDO LPDJH DQG WKH ZDWHUPDUN. VKRZQLQ)LJV D DQG D UHVSHFWLYHO\ZHUHXVHGLQWKH[r] ... See full document

13

A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation

A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation

... scheme for gray- level images based on image secret sharing and wavelet transformation is proposed in this ...a secret image generation phase and a watermark retrieval ...the ... See full document

6

An Efficient Probability-based t out of n Secret Image Sharing Scheme

An Efficient Probability-based t out of n Secret Image Sharing Scheme

... the secret pixels to blocks. As a result, the size of the secret image becomes larger, and the quality of the expanded secret image becomes ...visual secret sharing scheme, where the ... See full document

1

A probability model for reconstructing secret sharing under the internet environment

A probability model for reconstructing secret sharing under the internet environment

... A share spanning tree that connects the root node (the user that recreates the secret under consideration) to some other nodes such that its vertices hold all [r] ... See full document

19

Authentication of Binary Document Images in PNG Format Based on A  Secret Sharing Technique

Authentication of Binary Document Images in PNG Format Based on A Secret Sharing Technique

... image, secret sharing, data hiding, PNG ...methods for document image authentication [1]–[3] to ensure the integrity and authenticity of digital document images is ...useful for authentication ... See full document

6

Show all 10000 documents...