Results 91 to 100 of about 13,572 (291)
Switched Threshold Signatures from K-Private PolyShamir Secret Sharing [PDF]
Variant secret sharing schemes deriving from Shamir\u27s threshold secret sharing protocol are presented. Results include multi-secret sharing protocols using shares with $O(1)$ elements, independent of the number of secrets.
Kristian L. McDonald
core
A scientometric analysis of 2449 journal articles and a comprehensive review of 336 papers were conducted, discussing and identifying challenges and research gaps in rockburst prediction and prevention and proposing an ontology‐based framework for better decision‐making in underground excavations. Abstract With underground engineering projects becoming
Hongchuan Yan +6 more
wiley +1 more source
Efficient High-Dimensional Quantum Key Distribution with Hybrid Encoding
We propose a schematic setup of quantum key distribution (QKD) with an improved secret key rate based on high-dimensional quantum states. Two degrees-of-freedom of a single photon, orbital angular momentum modes, and multi-path modes, are used to encode ...
Yonggi Jo +3 more
doaj +1 more source
This study investigates ground subsidence during tunnel excavation in karst areas, highlighting the combined effects of karst cave proximity, cave size, and soil spatial variability. Findings suggest that shorter cave distances and larger cave sizes increase subsidence variability, and a modified Peck formula is proposed for more accurate subsidence ...
Zhenghong Su +4 more
wiley +1 more source
Some Secret Sharing Based on Hyperplanes
The secret sharing schemes (SSS) are widely used in secure multi-party computing and distributed computing, and the access structure is the key to constructing secret sharing schemes.
Guohui Wang, Yucheng Chen
doaj +1 more source
General $d$-level quantum multi-secret sharing scheme with cheating identification
This work proposes a $d$-dimensional quantum multi-secret sharing (QMSS) scheme with a cheat detection mechanism. The dealer creates the secret shares using multi access structures and a monotone span program.
Kumar, Sanjeev, Rathi, Deepa
core
An assessment of stress and production rate of sucker rod heat pipes in oil well pumping system
The sucker rod pumping system is the preferred oil extraction technique. The concept about equipping the hollow vacuum space in solid sucker rods with heat pipe has been scrutinized in terms of stress and oil production evaluation. Abstract The implementation of the heat pipe concept in sucker rods for oil pumping systems negates the requirement for an
R. S. Anand +5 more
wiley +1 more source
Distributed data hiding in multi-cloud storage environment
Classical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message ...
Leonel Moyou Metcheka, René Ndoundam
doaj +1 more source
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices [PDF]
In the setting of (t, n) threshold secret sharing, at least t parties can reconstruct the secret, and fewer than t parties learn nothing about the secret.
En Zhang +6 more
core +2 more sources
Critical expansion points: Mechanical signs of surrounding rock instability
This study proposes the Rock Bearing‐Expansion Model (RockBEM) with critical expansion points (CEPs) to quantify post‐peak damage stages in deep‐buried rock masses via plane strain compression test (PSCT). CEP hysteresis&interval ratios reveal bearing performance dynamics and failure severity, advancing mechanistic insights into deep underground rock ...
Jiaqi Wen +4 more
wiley +1 more source

