Results 91 to 100 of about 13,384 (274)

Efficient High-Dimensional Quantum Key Distribution with Hybrid Encoding

open access: yesEntropy, 2019
We propose a schematic setup of quantum key distribution (QKD) with an improved secret key rate based on high-dimensional quantum states. Two degrees-of-freedom of a single photon, orbital angular momentum modes, and multi-path modes, are used to encode ...
Yonggi Jo   +3 more
doaj   +1 more source

Metasurface Enhanced Photothermal Cement Foam for Robust and High‐Throughput Seawater Desalination

open access: yesCarbon Energy, EarlyView.
Schematic of 3D metasurface‐enhanced cement foam for robust and high‐throughput seawater desalination. This study presents a cement‐based solar evaporator (CSE) fabricated in one step via viscoelastic lithography with simple negative pressure. In addition to boosting solar‐to‐vapor conversion efficiency via excellent light‐harvesting capacity, the ...
Jianjun Guo   +4 more
wiley   +1 more source

Some Secret Sharing Based on Hyperplanes

open access: yesComputation
The secret sharing schemes (SSS) are widely used in secure multi-party computing and distributed computing, and the access structure is the key to constructing secret sharing schemes.
Guohui Wang, Yucheng Chen
doaj   +1 more source

General $d$-level quantum multi-secret sharing scheme with cheating identification

open access: yes, 2023
This work proposes a $d$-dimensional quantum multi-secret sharing (QMSS) scheme with a cheat detection mechanism. The dealer creates the secret shares using multi access structures and a monotone span program.
Kumar, Sanjeev, Rathi, Deepa
core  

Experimental and constitutive modeling investigations on marble in Jinping Underground Laboratory

open access: yesDeep Underground Science and Engineering, EarlyView.
The objective of this study is to reveal the underlying mechanisms behind the brittle‐ductile transition of the marble through a combination of experimental research and constitutive modeling. A series of triaxial compression and triaxial cyclic loading tests are conducted.
Susheng Wang   +3 more
wiley   +1 more source

Distributed data hiding in multi-cloud storage environment

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2020
Classical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message ...
Leonel Moyou Metcheka, René Ndoundam
doaj   +1 more source

Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices [PDF]

open access: yes
In the setting of (t, n) threshold secret sharing, at least t parties can reconstruct the secret, and fewer than t parties learn nothing about the secret.
En Zhang   +6 more
core   +2 more sources

A novel construction approach for the pore structure model principally focuses on the controllable roundness of rock particles

open access: yesDeep Underground Science and Engineering, EarlyView.
Particle rounding effects comparison of different methods: (a), (b), and (c) are the rounding results using the B‐spline curve method with different R; (d), (e), and (f) are the results of vertex rounding substitution method with different rounding radii.
Jiabin Dong   +6 more
wiley   +1 more source

Multi-secret Visual Cryptography Scheme with Tag Information

open access: yesDEStech Transactions on Computer Science and Engineering, 2017
Since that traditional tagged visual cryptography scheme (TVCS) can only hide only one secret image, this paper presents a multi-secret visual cryptography scheme with tag information. By adopting the concept of random grids (RG) to construct the basic share images of secret images and the tag images, and then combined them in the form of probability ...
Yan-yan HAN   +3 more
openaire   +2 more sources

An efficient and secure RSA--like cryptosystem exploiting R\'edei rational functions over conics

open access: yes, 2016
We define an isomorphism between the group of points of a conic and the set of integers modulo a prime equipped with a non-standard product. This product can be efficiently evaluated through the use of R\'edei rational functions.
Bellini, Emanuele, Murru, Nadir
core  

Home - About - Disclaimer - Privacy