|
|
|
Yu-Hong Chen and Justie Su-Tzu Juan
XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares. No information about the secret can be obtained from any o...
ver más
|
|
|
|
|
|
|
Anjaneyulu Endurthi,Oinam B. Chanu,Appala N. Tentu,V. Ch. Venkaiah
Pág. 15 - 24
Three secret sharing schemes that use the Mignotte?ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8]. The first s...
ver más
|
|
|
|
|
|
|
Djihed Anani,Kamel M. Faraoun
Pág. 94 - 103
In this paper, we present a new (t,n)-threshold secret images sharing scheme based on linear memory cellular automata (LMCA). While all existing LMCA-based sharing scheme are not robust, the proposed one provides full robustness property. Precisely, any ...
ver más
|
|
|
|
|
|
|
Tao Feng, Dewei Wang and Renbin Gong
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine...
ver más
|
|
|
|
|
|
|
Tao Liu, Bin Yan and Jeng-Shyang Pan
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc. Recently, researches have indicated that combini...
ver más
|
|
|
|
|
|
|
Ou Ruan, Changwang Yan, Jing Zhou and Chaohao Ai
Multiparty Private Set Intersection (MPSI) is dedicated to finding the intersection of datasets of multiple participants without disclosing any other information. Although many MPSI protocols have been presented, there are still some important practical ...
ver más
|
|
|
|
|
|
|
Bimal Kumar Roy and Anandarup Roy
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share th...
ver más
|
|
|
|
|
|
|
Agus Winarno and Riri Fitri Sari
Personal data security is a cybersecurity trend that has captured the world?s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely use...
ver más
|
|
|
|