09.01.2013 Views

SESSION NOVEL ALGORIHMS AND APPLICATIONS + ...

SESSION NOVEL ALGORIHMS AND APPLICATIONS + ...

SESSION NOVEL ALGORIHMS AND APPLICATIONS + ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

32 Int'l Conf. Foundations of Computer Science | FCS'11 |<br />

α in (4, 5)-threshold threshold secret sharing scheme of NS<br />

scheme is approach to 1 / 4000. Because Fang et al.<br />

use NS scheme to design their scheme, α in FFL<br />

scheme is in the same as α in NS scheme scheme. In our<br />

scheme, α is equal to 3 / 15 − 2 / 15 = 1 / 15 in the (4,<br />

(a)<br />

(c)<br />

(e)<br />

(g)<br />

(i)<br />

Figure 1. Experimental result of (4, 5)<br />

5)-threshold threshold secret sharing scheme. Also, for any (4,<br />

n)-threshold threshold secret sharing scheme in VC for n ≥ 6,<br />

our r proposed scheme has better performance perform than NS<br />

scheme [9] ] and FLL scheme [6] [ in the value of α.<br />

(a) Secret image S, (b) Share 1, (c) Share 2, (d) Share 3, (e) Share 4, (f) ) Share<br />

5, (g) ) The result of stacking share 1 and share 2, (h)The )The result of stacking<br />

share 1, share2 and share 3, 3 (i) The result of stacking share 1, share2, share<br />

3 and share 4, (j) The result of stacking all the shares.<br />

(b)<br />

(d)<br />

(f)<br />

(h)<br />

(j)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!