On the use of secret sharing as a secure multi-use pad
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Terrance E. Boult,et al. CloudStash: Using Secret-Sharing Scheme to Secure Data, Not Keys, in Multi-clouds , 2014, 2014 11th International Conference on Information Technology: New Generations.
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Shyong Jian Shyu,et al. Image encryption by multiple random grids , 2009, Pattern Recognit..
[5] Atulya K. Nagar,et al. Key-Based Steganographic Textual Secret Sharing for Confidential Messaging , 2013, SocProS.
[6] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[7] Vasif V. Nabiyev,et al. Medical image security and EPR hiding using Shamir's secret sharing scheme , 2011, J. Syst. Softw..
[8] Mohsen Toorani,et al. SMEmail - A New Protocol for the Secure E-mail in Mobile Environments , 2008, 2008 Australasian Telecommunication Networks and Applications Conference.
[9] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[10] Ali Aydin Selçuk,et al. Threshold Cryptography Based on Asmuth-Bloom Secret Sharing , 2006, ISCIS.
[11] R. Kishore Kumar,et al. Securing Multi-cloud Using Secret Sharing Algorithm , 2015 .
[12] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[13] Katsumi Takahashi,et al. Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation , 2013, ACISP.
[14] KayaKamer,et al. Threshold cryptography based on Asmuth-Bloom secret sharing , 2007 .
[15] A. Kolmogorov. Three approaches to the quantitative definition of information , 1968 .
[16] Alfredo De Santis,et al. Constructions and Bounds for Visual Cryptography , 1996, ICALP.
[17] E. Keren,et al. Encryption of pictures and shapes by random grids. , 1987, Optics letters.
[18] Donghui Guo,et al. Comparing Security Notions of Secret Sharing Schemes , 2015, Entropy.
[19] Shaohua Tang,et al. Sharing Multi-Secret Based on Circle Properties , 2008, 2008 International Conference on Computational Intelligence and Security.
[20] Moti Yung,et al. Secret swarm unit: Reactive k-secret sharing , 2012, Ad Hoc Networks.
[21] W. Gareth J. Howells,et al. A Robust Multimodal Biometric Security System Using the Polynomial Curve Technique within Shamir's Secret Sharing Algorithm , 2012, 2012 Third International Conference on Emerging Security Technologies.
[22] Wei Sun,et al. Improving the visual quality of random grid-based visual secret sharing , 2013, Signal Process..