scholarly journals Graph access structures with optimal pixel expansion three

2013 ◽  
Vol 230 ◽  
pp. 67-75
Author(s):  
S. Arumugam ◽  
R. Lakshmanan ◽  
Atulya K. Nagar
2017 ◽  
Vol 9 (2) ◽  
pp. 38-44 ◽  
Author(s):  
Teng Guo ◽  
Jian Jiao ◽  
Feng Liu ◽  
Wen Wang

In this paper, we first follow Ateniese et al.'s work that provides upper bounds of the pixel expansion of visual cryptography schemes(VCSs) for more kinds of graph access structures, in which we require that a subset of parties can determine the secret if they contain an edge of the graph G. The constructive upper bounds are derived by the graph decomposition technique. Then we generalize Ateniese et al.'s method of comparing the optimal pixel expansion of VCSs with two different access structures.


Cryptography ◽  
2020 ◽  
pp. 537-544
Author(s):  
Teng Guo ◽  
Jian Jiao ◽  
Feng Liu ◽  
Wen Wang

In this paper, we first follow Ateniese et al.'s work that provides upper bounds of the pixel expansion of visual cryptography schemes(VCSs) for more kinds of graph access structures, in which we require that a subset of parties can determine the secret if they contain an edge of the graph G. The constructive upper bounds are derived by the graph decomposition technique. Then we generalize Ateniese et al.'s method of comparing the optimal pixel expansion of VCSs with two different access structures.


2015 ◽  
Vol 9 (5) ◽  
pp. 778-787 ◽  
Author(s):  
Yun Song ◽  
Zhihui Li ◽  
Yongming Li ◽  
Ren Xin

2010 ◽  
Vol 24 (2) ◽  
pp. 617-638 ◽  
Author(s):  
Hung-Min Sun ◽  
Huaxiong Wang ◽  
Bying-He Ku ◽  
Josef Pieprzyk

2011 ◽  
Vol 67 (2) ◽  
pp. 169-173 ◽  
Author(s):  
Motahhareh Gharahi ◽  
Massoud Hadian Dehkordi

2017 ◽  
Vol 11 (1) ◽  
pp. 25-35
Author(s):  
Massoud Hadian Dehkordi ◽  
Ali Safi

AbstractIn this paper, we study an important problem in secret sharing that determines the exact value or bound for the complexity. First, we use the induced subgraph complexity of the graph G with access structure Γ to obtain a lower bound on the complexity of the graph G. Then, applying decomposition techniques, we obtain an upper bound on the complexity of the graph G. We determine the exact values of the complexity for each of the ten graph access structures on seven participants. Also, we improve the value bound of the complexity for the six graph access structures with seven participants.


Sign in / Sign up

Export Citation Format

Share Document