Private-Key Cryptosystem. Furht, B., editor In Encyclopedia of Multimedia, pages 736–737. Springer US, 2008. 00000
Private-Key Cryptosystem [link]Paper  abstract   bibtex   
DefinitionA private-key cryptosystem can be obtained using the visual cryptography concepts or perfect-reconstruction based image secret sharing.A (2, 2)-scheme is the most popular solution within the (k, n) framework due to its common acceptance as a private-key cryptosystem [1–3]. Such a cryptographic solution encrypts the secret image into two noise-like shares. One of the two generated shares can be viewed as a private share or private-key, and is kept by the owner. The other share represents a public share which can be transmitted over an untrusted communication channel. The secret image is reconstructed only if both the public and private shares are used for decryption.A private-key cryptosystem can be obtained using the visual cryptography concepts [1] or perfect-reconstruction based image secret sharing [2]. Both these solutions encrypt each pixel of the secret image into a block of share pixels and because of their expansion nature, such solutions produce the shares ...
@incollection{furht_private-key_2008,
	title = {Private-{Key} {Cryptosystem}},
	copyright = {©2008 Springer-Verlag},
	isbn = {978-0-387-74724-8 978-0-387-78414-4},
	url = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_184},
	abstract = {DefinitionA private-key cryptosystem can be obtained using the visual cryptography concepts or perfect-reconstruction based image secret sharing.A (2, 2)-scheme is the most popular solution within the (k, n) framework due to its common acceptance as a private-key cryptosystem [1–3]. Such a cryptographic solution encrypts the secret image into two noise-like shares. One of the two generated shares can be viewed as a private share or private-key, and is kept by the owner. The other share represents a public share which can be transmitted over an untrusted communication channel. The secret image is reconstructed only if both the public and private shares are used for decryption.A private-key cryptosystem can be obtained using the visual cryptography concepts [1] or perfect-reconstruction based image secret sharing [2]. Both these solutions encrypt each pixel of the secret image into a block of share pixels and because of their expansion nature, such solutions produce the shares ...},
	language = {en},
	urldate = {2016-05-03},
	booktitle = {Encyclopedia of {Multimedia}},
	publisher = {Springer US},
	editor = {Furht, Borko},
	year = {2008},
	note = {00000},
	pages = {736--737}
}

Downloads: 0