The secret life of academic papers
Abstract
Recommendations
Fair secret reconstruction in (t, n) secret sharing
In Shamir's (t, n) threshold secret sharing scheme, one secret s is divided into n shares by a dealer and all shares are shared among n shareholders, such that knowing t or more than t shares can reconstruct this secret; but knowing fewer than t shares ...
Secret sharing with secure secret reconstruction
AbstractThreshold secret sharing is a fundamental building block in information security to provide secrecy and robustness services for various cryptographic protocols. According to the definition of (t, n) threshold secret sharing, the secret ...
Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationVisual secret sharing (VSS) schemes have been proposed by Naor and Shamir [1] in 1995. It encodes a binary secret image into several meaningless images called shares or transparencies. The secret image can be obtained by stacking the qualified set of ...
Comments
Information & Contributors
Information
Published In
![cover image ACM SIGSOFT Software Engineering Notes](/cms/asset/78d9a0ac-37ea-44a9-9b10-f0e81c4156ad/2108144.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Column
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 124Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in