Results 91 to 100 of about 13,572 (291)

Switched Threshold Signatures from K-Private PolyShamir Secret Sharing [PDF]

open access: yes, 2020
Variant secret sharing schemes deriving from Shamir\u27s threshold secret sharing protocol are presented. Results include multi-secret sharing protocols using shares with $O(1)$ elements, independent of the number of secrets.
Kristian L. McDonald
core  

A review on rockburst prediction and prevention to shape an ontology‐based framework for better decision‐making for underground excavations

open access: yesDeep Underground Science and Engineering, EarlyView.
A scientometric analysis of 2449 journal articles and a comprehensive review of 336 papers were conducted, discussing and identifying challenges and research gaps in rockburst prediction and prevention and proposing an ontology‐based framework for better decision‐making in underground excavations. Abstract With underground engineering projects becoming
Hongchuan Yan   +6 more
wiley   +1 more source

Efficient High-Dimensional Quantum Key Distribution with Hybrid Encoding

open access: yesEntropy, 2019
We propose a schematic setup of quantum key distribution (QKD) with an improved secret key rate based on high-dimensional quantum states. Two degrees-of-freedom of a single photon, orbital angular momentum modes, and multi-path modes, are used to encode ...
Yonggi Jo   +3 more
doaj   +1 more source

Random finite element analysis on ground subsidence caused by tunnel excavation in karst regions with spatial variable soil

open access: yesDeep Underground Science and Engineering, EarlyView.
This study investigates ground subsidence during tunnel excavation in karst areas, highlighting the combined effects of karst cave proximity, cave size, and soil spatial variability. Findings suggest that shorter cave distances and larger cave sizes increase subsidence variability, and a modified Peck formula is proposed for more accurate subsidence ...
Zhenghong Su   +4 more
wiley   +1 more source

Some Secret Sharing Based on Hyperplanes

open access: yesComputation
The secret sharing schemes (SSS) are widely used in secure multi-party computing and distributed computing, and the access structure is the key to constructing secret sharing schemes.
Guohui Wang, Yucheng Chen
doaj   +1 more source

General $d$-level quantum multi-secret sharing scheme with cheating identification

open access: yes, 2023
This work proposes a $d$-dimensional quantum multi-secret sharing (QMSS) scheme with a cheat detection mechanism. The dealer creates the secret shares using multi access structures and a monotone span program.
Kumar, Sanjeev, Rathi, Deepa
core  

An assessment of stress and production rate of sucker rod heat pipes in oil well pumping system

open access: yesDeep Underground Science and Engineering, EarlyView.
The sucker rod pumping system is the preferred oil extraction technique. The concept about equipping the hollow vacuum space in solid sucker rods with heat pipe has been scrutinized in terms of stress and oil production evaluation. Abstract The implementation of the heat pipe concept in sucker rods for oil pumping systems negates the requirement for an
R. S. Anand   +5 more
wiley   +1 more source

Distributed data hiding in multi-cloud storage environment

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2020
Classical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message ...
Leonel Moyou Metcheka, René Ndoundam
doaj   +1 more source

Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices [PDF]

open access: yes
In the setting of (t, n) threshold secret sharing, at least t parties can reconstruct the secret, and fewer than t parties learn nothing about the secret.
En Zhang   +6 more
core   +2 more sources

Critical expansion points: Mechanical signs of surrounding rock instability

open access: yesDeep Underground Science and Engineering, EarlyView.
This study proposes the Rock Bearing‐Expansion Model (RockBEM) with critical expansion points (CEPs) to quantify post‐peak damage stages in deep‐buried rock masses via plane strain compression test (PSCT). CEP hysteresis&interval ratios reveal bearing performance dynamics and failure severity, advancing mechanistic insights into deep underground rock ...
Jiaqi Wen   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy