2007
DOI: 10.1016/j.patcog.2006.11.018
|View full text |Cite
|
Sign up to set email alerts
|

Two secret sharing schemes based on Boolean operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
100
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 231 publications
(100 citation statements)
references
References 21 publications
0
100
0
Order By: Relevance
“…A secret sharing scheme can be evaluated based on a number of properties, including its security, reconstruction precision, computation complexity and storage requirement [21]. This section presents an analysis and discussion of the QRCSS scheme based on these properties.…”
Section: Analysis and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…A secret sharing scheme can be evaluated based on a number of properties, including its security, reconstruction precision, computation complexity and storage requirement [21]. This section presents an analysis and discussion of the QRCSS scheme based on these properties.…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…The secret can only be reconstructed when information from an authorized number of shares is combined [2]. By splitting and encoding a secret into a number of shares, secret sharing overcomes the problem of storing a secret in a single information-carrier, which can easily be lost or damaged [19,21]. Secret sharing schemes are important tools that have found many applications in cryptography and distributed computing [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This model constructs an efficient (k, k)-VCS based on "XOR". A number of XOR-based VCSs were proposed in [15], [16]. The share images of these schemes are still meaningless.…”
Section: Introductionmentioning
confidence: 99%
“…These types of secret sharing schemes are known as traditional non-visual Secret Sharing (SS). Another type of a secret sharing scheme is Visual Secret Sharing (VSS) [9][10][11][12][13][14][15], which was first designed in 1995 by N o a r and S h a m i r [9], based on the (k, n)-threshold concept. In VSS scheme, out of n, any k or more shares can reconstruct the original image "visually" by superimposing the shares and it does not involve any complex computations.…”
Section: Introductionmentioning
confidence: 99%