Results 21 to 30 of about 211,108 (260)

DNA Based Multi-secret Image Sharing

open access: yesProcedia Computer Science, 2015
AbstractMultiple secret sharing algorithm using the YCH scheme, combined with DNA encoding is proposed, focusing at better security. Firstly, DNA encoding for multiple images is carried out; then the addition of these encoded components by DNA is performed.
Anbarasi, L. Jani   +2 more
openaire   +1 more source

Continuous Variable Quantum State Sharing via Quantum Disentanglement [PDF]

open access: yes, 2005
Quantum state sharing is a protocol where perfect reconstruction of quantum states is achieved with incomplete or partial information in a multi-partite quantum networks.
A. Furusawa   +9 more
core   +1 more source

Dynamic Multi-secret Sharing Scheme in Vector Space Without Trusted Center [PDF]

open access: yesJisuanji gongcheng, 2017
The existing secret sharing scheme in the vector space cannot achieve the secret share update or the dynamic addition and deletion of members,and it is hard to ensure the existence of trusted center,so a multi-secret sharing scheme without trusted center
WANG Yuli,DU Weizhang
doaj   +1 more source

Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm

open access: yesEntropy, 2023
Reversible Data Hiding in Encrypted Image (RDHEI) is a technology for embedding secret information in an encrypted image. It allows the extraction of secret information and lossless decryption and the reconstruction of the original image.
Chi-Yao Weng, Cheng-Hsing Yang
doaj   +1 more source

Multi-party Quantum Computation [PDF]

open access: yes, 2001
We investigate definitions of and protocols for multi-party quantum computing in the scenario where the secret data are quantum systems. We work in the quantum information-theoretic model, where no assumptions are made on the computational power of the ...
Smith, Adam
core   +4 more sources

An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing

open access: yesIET Information Security, 2021
Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting.
Hossein Pilaram   +2 more
doaj   +1 more source

Conjunctive Hierarchical Multi-Secret Sharing Scheme using Elliptic Curves

open access: yesIndian Journal of Pure and Applied Mathematics, 2023
In the present paper, the authors provide a conjunctive hierarchical multi-secret sharing scheme using elliptic curves and bilinear pairings. The scheme distributes several secrets among users grouped in hierarchical levels, where only authorized subsets of users from each level can collaborate to reconstruct the secrets.
Chintamani, Mohan   +2 more
openaire   +1 more source

Experimental observation of four-photon entanglement from down-conversion [PDF]

open access: yes, 2003
We observe polarization-entanglement between four photons produced from a single down-conversion source. The non-classical correlations between the measurement results violate a generalized Bell inequality for four qubits.
Christian Kurtsiefer   +7 more
core   +2 more sources

New results and applications for multi-secret sharing schemes [PDF]

open access: yes, 2014
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some set , each one according to an access structure. The trivial solution to this problem is to run independent instances of a standard secret sharing scheme,
Herranz Sotoca, Javier   +2 more
core   +2 more sources

Fully privacy-preserving distributed optimization in power systems based on secret sharing

open access: yesiEnergy, 2022
With the increasing development of smart grid, multi-party cooperative computation between several entities has become a typical characteristic of modern energy systems.
Nianfeng Tian   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy