We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 40 results
  1. A novel threshold changeable secret sharing scheme

    A ( t, n ) threshold secret sharing scheme is a fundamental tool in many security applications such as cloud computing and multiparty computing. In...

    Lein Harn, Chingfang Hsu, Zhe **a in Frontiers of Computer Science
    Article 08 October 2021
  2. Scientometric dimensions of cryptographic research

    Information security has been a crucial issue in modern information management; thus cryptographic techniques have become inevitable to safeguard...

    Jiban K. Pal in Scientometrics
    Article 23 August 2015
  3. Cheating detectable threshold scheme against most powerful cheaters for long secrets

    In this paper, we propose a framework of cheating-detectable threshold schemes against the most powerful cheaters. Our scheme is used to distribute...

    Wakaha Ogata, Hiroshi Eguchi in Designs, Codes and Cryptography
    Article 14 October 2012
  4. Long term confidentiality: a survey

    Sensitive electronic data may be required to remain confidential for long periods of time. Yet encryption under a computationally secure cryptosystem...

    Johannes Braun, Johannes Buchmann, ... Alex Wiesmaier in Designs, Codes and Cryptography
    Article 16 September 2012
  5. The complexity of the graph access structures on six participants

    In this paper, we deal with determining the exact values for the complexity of the five graph access structures on six participants, which remained...

    Motahhareh Gharahi, Massoud Hadian Dehkordi in Designs, Codes and Cryptography
    Article 21 December 2011
  6. Asynchronous privacy-preserving iterative computation on peer-to-peer networks

    Privacy preserving algorithms allow several participants to compute a global function collaboratively without revealing local information to each...

    J. A. M. Naranjo, L. G. Casado, Márk Jelasity in Computing
    Article 26 June 2012
  7. Signcryption schemes with threshold unsigncryption, and applications

    The goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than...

    Javier Herranz, Alexandre Ruiz, Germán Sáez in Designs, Codes and Cryptography
    Article 16 May 2012
  8. On the optimization of bipartite secret sharing schemes

    Optimizing the ratio between the maximum length of the shares and the length of the secret value in secret sharing schemes for general access...

    Oriol Farràs, Jessica Ruth Metcalf-Burton, ... Leonor Vázquez in Designs, Codes and Cryptography
    Article 24 August 2011
  9. A new class of 3-fold perfect splitting authentication codes

    Restricted strong partially balanced t -designs were first formulated by Pei, Li, Wang and Safavi-Naini in investigation of authentication codes with...

    Miao Liang, Beiliang Du in Designs, Codes and Cryptography
    Article 27 March 2011
  10. On-line secret sharing

    In a perfect secret sharing scheme the dealer distributes shares to participants so that qualified subsets can recover the secret, while unqualified...

    László Csirmaz, Gábor Tardos in Designs, Codes and Cryptography
    Article 09 July 2011
  11. A new class of splitting 3-designs

    Splitting t -designs were first formulated by Huber in recent investigation of optimal ( t − 1)-fold secure splitting authentication codes. In this...

    Miao Liang, Beiliang Du in Designs, Codes and Cryptography
    Article 17 September 2010
  12. Optimal complexity of secret sharing schemes with four minimal qualified subsets

    The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the shares and the length of the secret. This paper...

    Jaume Martí-Farré, Carles Padró, Leonor Vázquez in Designs, Codes and Cryptography
    Article 04 November 2010
  13. A general method for construction of (t, n)-threshold visual secret sharing schemes for color images

    This paper is concerned with the construction of basis matrices of visual secret sharing schemes for color images under the ( t , n )-threshold access...

    Hiroki Koga, Takeru Ishihara in Designs, Codes and Cryptography
    Article 01 January 2011
  14. A class of authentication codes with secrecy

    We study a class of authentication codes with secrecy. We determine the maximum success probabilities of the impersonation and the substitution...

    Elif Kurtaran Özbudak, Ferruh Özbudak, Zülfükar Saygı in Designs, Codes and Cryptography
    Article 08 December 2010
  15. Generalized oblivious transfer by secret sharing

    The notion of Generalized Oblivious Transfer (GOT) was introduced by Ishai and Kushilevitz (Proceeding of ISTCS97, IEEE Computer Society, pp 174–184,...

    Article 14 March 2010
  16. Practical unconditionally secure two-channel message authentication

    We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. (Two-channel...

    Atefeh Mashatan, Douglas R. Stinson in Designs, Codes and Cryptography
    Article 03 January 2010
  17. Anonymity in shared symmetric key primitives

    We provide a stronger definition of anonymity in the context of shared symmetric key primitives, and show that existing schemes do not provide this...

    Gregory M. Zaverucha, Douglas R. Stinson in Designs, Codes and Cryptography
    Article 20 January 2010
  18. An impossibility result on graph secret sharing

    A perfect secret sharing scheme based on a graph G is a randomized distribution of a secret among the vertices of the graph so that the secret can be...

    László Csirmaz in Designs, Codes and Cryptography
    Article 09 June 2009
  19. Detection and identification of cheaters in (t, n) secret sharing scheme

    In a ( t , n ) secret sharing scheme, a secret s is divided into n shares and shared among a set of n shareholders by a mutually trusted dealer in such...

    Lein Harn, Changlu Lin in Designs, Codes and Cryptography
    Article 11 January 2009
Did you find what you were looking for? Share feedback.