Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Western Kentucky University

2012

Vector space

Articles 1 - 1 of 1

Full-Text Articles in Computer Sciences

Efficient Algorithm To Construct Phi Function In Vector Space Secret Sharing Scheme And Application Of Secret Sharing Scheme In Visual Cryptography, Sunny Potay May 2012

Efficient Algorithm To Construct Phi Function In Vector Space Secret Sharing Scheme And Application Of Secret Sharing Scheme In Visual Cryptography, Sunny Potay

Masters Theses & Specialist Projects

Secret Sharing refers to a method through which a secret key K can be shared among a group of authorized participants, such that when they come together later, they can figure out the secret key K to decrypt the encrypted message. Any group which is not authorized cannot determine the secret key K. Some of the important secret schemes are Shamir Threshold Scheme, Monotone Circuit Scheme, and Brickell Vector Space Scheme. Brikell’s vector space secret sharing construction requires the existence of a function from a set of participant P in to vector space Zdp, where p is a …