Li Daxing, Li Dawei. ATTACKS ON REAL POLYNOMIAL TYPE PUBLIC-KEY CRYPTOSYSTEMS AND DISCUSSION ON RELATED PROBLEMS[J]. Journal of Electronics & Information Technology, 1994, 16(3): 284-289.
Citation:
Fu Zheng-Xin, Shen Gang, Kong Zhi-Yin, Yu Bin. Investigation on Ideal Access Structure of XOR-based Visual Cryptography[J]. Journal of Electronics & Information Technology, 2014, 36(7): 1642-1647. doi: 10.3724/SP.J.1146.2013.01395
Li Daxing, Li Dawei. ATTACKS ON REAL POLYNOMIAL TYPE PUBLIC-KEY CRYPTOSYSTEMS AND DISCUSSION ON RELATED PROBLEMS[J]. Journal of Electronics & Information Technology, 1994, 16(3): 284-289.
Citation:
Fu Zheng-Xin, Shen Gang, Kong Zhi-Yin, Yu Bin. Investigation on Ideal Access Structure of XOR-based Visual Cryptography[J]. Journal of Electronics & Information Technology, 2014, 36(7): 1642-1647. doi: 10.3724/SP.J.1146.2013.01395
The definition of ideal access structure of XOR-based visual cryptography is given in this paper. The characteristics of ideal access structure are analyzed, and the construction algorithm of shares under ideal access structure is designed. Based on the above results, a new algorithm is proposed for dividing the general access structure into some ideal access structures, and the secret sharing and recovering algorithms are presented. Compared with the previous schemes, the proposed scheme realizes the perfect recovery of secret image, and the sizes of shares can be decreased efficiently.
Li Daxing, Li Dawei. ATTACKS ON REAL POLYNOMIAL TYPE PUBLIC-KEY CRYPTOSYSTEMS AND DISCUSSION ON RELATED PROBLEMS[J]. Journal of Electronics & Information Technology, 1994, 16(3): 284-289.
Li Daxing, Li Dawei. ATTACKS ON REAL POLYNOMIAL TYPE PUBLIC-KEY CRYPTOSYSTEMS AND DISCUSSION ON RELATED PROBLEMS[J]. Journal of Electronics & Information Technology, 1994, 16(3): 284-289.