August  2008, 2(3): 249-259. doi: 10.3934/amc.2008.2.249

How to say yes, no and maybe with visual cryptography

1. 

Dept. of Pure Mathematics and Computer Algebra, Ghent University, Krijgslaan 281-S22, 9000 Ghent, Belgium

Received  January 2008 Revised  June 2008 Published  July 2008

We present a version of a visual cryptography scheme in which a qualified set of participants is able to block the reconstruction of the secret.
Citation: Andreas Klein. How to say yes, no and maybe with visual cryptography. Advances in Mathematics of Communications, 2008, 2 (3) : 249-259. doi: 10.3934/amc.2008.2.249
[1]

Bagher Bagherpour, Shahrooz Janbaz, Ali Zaghian. Optimal information ratio of secret sharing schemes on Dutch windmill graphs. Advances in Mathematics of Communications, 2019, 13 (1) : 89-99. doi: 10.3934/amc.2019005

[2]

Stefka Bouyuklieva, Zlatko Varbanov. Some connections between self-dual codes, combinatorial designs and secret sharing schemes. Advances in Mathematics of Communications, 2011, 5 (2) : 191-198. doi: 10.3934/amc.2011.5.191

[3]

Ryutaroh Matsumoto. Strongly secure quantum ramp secret sharing constructed from algebraic curves over finite fields. Advances in Mathematics of Communications, 2019, 13 (1) : 1-10. doi: 10.3934/amc.2019001

[4]

Florian Luca, Igor E. Shparlinski. On finite fields for pairing based cryptography. Advances in Mathematics of Communications, 2007, 1 (3) : 281-286. doi: 10.3934/amc.2007.1.281

[5]

Feng Yang, Kok Lay Teo, Ryan Loxton, Volker Rehbock, Bin Li, Changjun Yu, Leslie Jennings. VISUAL MISER: An efficient user-friendly visual program for solving optimal control problems. Journal of Industrial & Management Optimization, 2016, 12 (2) : 781-810. doi: 10.3934/jimo.2016.12.781

[6]

Diego F. Aranha, Ricardo Dahab, Julio López, Leonardo B. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications, 2010, 4 (2) : 169-187. doi: 10.3934/amc.2010.4.169

[7]

Gerhard Frey. Relations between arithmetic geometry and public key cryptography. Advances in Mathematics of Communications, 2010, 4 (2) : 281-305. doi: 10.3934/amc.2010.4.281

[8]

Gérard Maze, Chris Monico, Joachim Rosenthal. Public key cryptography based on semigroup actions. Advances in Mathematics of Communications, 2007, 1 (4) : 489-507. doi: 10.3934/amc.2007.1.489

[9]

Jintai Ding, Sihem Mesnager, Lih-Chung Wang. Letters for post-quantum cryptography standard evaluation. Advances in Mathematics of Communications, 2020, 14 (1) : i-i. doi: 10.3934/amc.2020012

[10]

Grégory Faye, Pascal Chossat. A spatialized model of visual texture perception using the structure tensor formalism. Networks & Heterogeneous Media, 2013, 8 (1) : 211-260. doi: 10.3934/nhm.2013.8.211

[11]

Juliang Zhang, Jian Chen. Information sharing in a make-to-stock supply chain. Journal of Industrial & Management Optimization, 2014, 10 (4) : 1169-1189. doi: 10.3934/jimo.2014.10.1169

[12]

Dan Mangoubi. A gradient estimate for harmonic functions sharing the same zeros. Electronic Research Announcements, 2014, 21: 62-71. doi: 10.3934/era.2014.21.62

[13]

Rafael Bravo De La Parra, Luis Sanz. A discrete model of competing species sharing a parasite. Discrete & Continuous Dynamical Systems - B, 2017, 22 (11) : 0-0. doi: 10.3934/dcdsb.2019204

[14]

Lidong Chen, Dustin Moody. New mission and opportunity for mathematics researchers: Cryptography in the quantum era. Advances in Mathematics of Communications, 2020, 14 (1) : 161-169. doi: 10.3934/amc.2020013

[15]

Jong Soo Kim, Won Chan Jeong. A model for buyer and supplier coordination and information sharing in order-up-to systems. Journal of Industrial & Management Optimization, 2012, 8 (4) : 987-1015. doi: 10.3934/jimo.2012.8.987

[16]

João Correia-da-Silva, Joana Pinho. The profit-sharing rule that maximizes sustainability of cartel agreements. Journal of Dynamics & Games, 2016, 3 (2) : 143-151. doi: 10.3934/jdg.2016007

[17]

Adriana Navarro-Ramos, William Olvera-Lopez. A solution for discrete cost sharing problems with non rival consumption. Journal of Dynamics & Games, 2018, 5 (1) : 31-39. doi: 10.3934/jdg.2018004

[18]

Daniele Bartoli, Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco. A 3-cycle construction of complete arcs sharing $(q+3)/2$ points with a conic. Advances in Mathematics of Communications, 2013, 7 (3) : 319-334. doi: 10.3934/amc.2013.7.319

[19]

Shiyong Li, Wei Sun, Quan-Lin Li. Utility maximization for bandwidth allocation in peer-to-peer file-sharing networks. Journal of Industrial & Management Optimization, 2017, 13 (5) : 1-19. doi: 10.3934/jimo.2018194

[20]

Xue-Yan Wu, Zhi-Ping Fan, Bing-Bing Cao. Cost-sharing strategy for carbon emission reduction and sales effort: A nash game with government subsidy. Journal of Industrial & Management Optimization, 2017, 13 (5) : 1-29. doi: 10.3934/jimo.2019040

2018 Impact Factor: 0.879

Metrics

  • PDF downloads (11)
  • HTML views (0)
  • Cited by (0)

Other articles
by authors

[Back to Top]