Results 61 to 70 of about 13,572 (291)
Contributions to secret sharing and other distributed cryptosystems [PDF]
The present thesis deals with primitives related to the eld of distributed cryptography. First, we study signcryption schemes, which provide at the same time the functionalities of encryption and signature, where the unsigncryption operation is ...
Ruiz Rodriguez, Alexandre
core +3 more sources
A volcano‐inspired dual‐carbon aerogel featuring hierarchical conduits and an outer carbon‐fiber shell directs rapid water transport, confines heat, and enables directional salt migration. Radial temperature gradients in the conical structure trigger Marangoni‐driven edge‐localized salt crystallization while maintaining an unobstructed photothermal ...
Shuyue Feng +8 more
wiley +1 more source
Optimal Improvement Ratios of Multi-Secret Sharing Schemes Can Be Achieved
Secret sharing schemes (SSS) deal with activities relative to the secure distribution of a secret among a group of participants who then securely reconstruct the secret by collecting the shares which are held by individuals in qualified sets.
Juan Justie Su-Tzu +2 more
doaj +1 more source
Algorithms for multi-secret hierarchical sharing schemes of shamir type [PDF]
In this paper there are presented algorithms for multilevel hierarchical threshold secret sharing schemes based on the interpolation of Hermite type, which use either traditional Shamir's keys or polynomial and orthogonal polynomial keys.
Kapusta, Joanna, Smarzewski, Ryszard
core +2 more sources
This study presents a micro‐dot array strategy for dynamic light encryption, utilizing DASA‐based photochromism with resolution beyond human‐eye capacity. By precisely controlling isomerization kinetics, the method reveals multi‐layered encrypted information under specific light irradiation, enhancing information security and anti‐counterfeiting ...
Hongtao Hu +10 more
wiley +1 more source
Алгоритм формирования матриц над примарным кольцом вычетов для построения протоколов множественного разделения секрета, реализующих заданную иерархию доступа [PDF]
Perfect linear multi-secret sharing schemes over primary residue ring construction algorithm is proposed. Early known secret sharing schemes over finite field construction method is generalized by proposed algorithm.
Волошин, Андрей
core
ABSTRACT Vending is an important sector in the daily lives of many people, and coffee is the most frequently consumed product in the European market. Like many other sectors, vending is responding to the challenge of sustainable development by taking various actions, such as offering increasingly ecologically sound coffee while maintaining/improving ...
Alberto Bertossi +2 more
wiley +1 more source
Privacy of the outsourced data is one of the major challenge.Insecurity of the network environment and untrustworthiness of the service providers are obstacles of making the database as a service.Collection and storage of personally identifiable ...
Binu, V. P. +2 more
core +1 more source
Abstract Domesticated European rabbits (Oryctolagus cuniculus) have long been chosen as laboratory model organisms. Despite this, there has been no definitive study of the vertebral musculature of wild rabbits. Relevant descriptions of well‐studied veterinary model mammals (such as dogs) are generally applicable, but not appropriate for a species ...
Nuttakorn Taewcharoen +3 more
wiley +1 more source
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley +1 more source

