Ci-Lin Li

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Recently, Chung et al. (2009) proposed a novel and valuable threshold authenticated encryption scheme. Unfortunately, it has a potential weakness: if the secret message involves criminal evidence or illegal content, the designated receiver cannot authenticate the secret message in the later dispute. The authors of this paper aim at enhancing Chung et al.'s(More)
It’s well-known that visual secret sharing aims at encrypting a secret image into numerous meaningless sharing images by either designing a well-designed codebook or generating random bit sequence, and reconstructing the secret by superimposing them without any computation involved. However, the traditional visual secret sharing schemes only deal(More)
  • 1