Results 91 to 100 of about 13,384 (274)
Efficient High-Dimensional Quantum Key Distribution with Hybrid Encoding
We propose a schematic setup of quantum key distribution (QKD) with an improved secret key rate based on high-dimensional quantum states. Two degrees-of-freedom of a single photon, orbital angular momentum modes, and multi-path modes, are used to encode ...
Yonggi Jo +3 more
doaj +1 more source
Metasurface Enhanced Photothermal Cement Foam for Robust and High‐Throughput Seawater Desalination
Schematic of 3D metasurface‐enhanced cement foam for robust and high‐throughput seawater desalination. This study presents a cement‐based solar evaporator (CSE) fabricated in one step via viscoelastic lithography with simple negative pressure. In addition to boosting solar‐to‐vapor conversion efficiency via excellent light‐harvesting capacity, the ...
Jianjun Guo +4 more
wiley +1 more source
Some Secret Sharing Based on Hyperplanes
The secret sharing schemes (SSS) are widely used in secure multi-party computing and distributed computing, and the access structure is the key to constructing secret sharing schemes.
Guohui Wang, Yucheng Chen
doaj +1 more source
General $d$-level quantum multi-secret sharing scheme with cheating identification
This work proposes a $d$-dimensional quantum multi-secret sharing (QMSS) scheme with a cheat detection mechanism. The dealer creates the secret shares using multi access structures and a monotone span program.
Kumar, Sanjeev, Rathi, Deepa
core
Experimental and constitutive modeling investigations on marble in Jinping Underground Laboratory
The objective of this study is to reveal the underlying mechanisms behind the brittle‐ductile transition of the marble through a combination of experimental research and constitutive modeling. A series of triaxial compression and triaxial cyclic loading tests are conducted.
Susheng Wang +3 more
wiley +1 more source
Distributed data hiding in multi-cloud storage environment
Classical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message ...
Leonel Moyou Metcheka, René Ndoundam
doaj +1 more source
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices [PDF]
In the setting of (t, n) threshold secret sharing, at least t parties can reconstruct the secret, and fewer than t parties learn nothing about the secret.
En Zhang +6 more
core +2 more sources
Particle rounding effects comparison of different methods: (a), (b), and (c) are the rounding results using the B‐spline curve method with different R; (d), (e), and (f) are the results of vertex rounding substitution method with different rounding radii.
Jiabin Dong +6 more
wiley +1 more source
Multi-secret Visual Cryptography Scheme with Tag Information
Since that traditional tagged visual cryptography scheme (TVCS) can only hide only one secret image, this paper presents a multi-secret visual cryptography scheme with tag information. By adopting the concept of random grids (RG) to construct the basic share images of secret images and the tag images, and then combined them in the form of probability ...
Yan-yan HAN +3 more
openaire +2 more sources
An efficient and secure RSA--like cryptosystem exploiting R\'edei rational functions over conics
We define an isomorphism between the group of points of a conic and the set of integers modulo a prime equipped with a non-standard product. This product can be efficiently evaluated through the use of R\'edei rational functions.
Bellini, Emanuele, Murru, Nadir
core

