Results 21 to 30 of about 211,108 (260)
DNA Based Multi-secret Image Sharing
AbstractMultiple secret sharing algorithm using the YCH scheme, combined with DNA encoding is proposed, focusing at better security. Firstly, DNA encoding for multiple images is carried out; then the addition of these encoded components by DNA is performed.
Anbarasi, L. Jani +2 more
openaire +1 more source
Continuous Variable Quantum State Sharing via Quantum Disentanglement [PDF]
Quantum state sharing is a protocol where perfect reconstruction of quantum states is achieved with incomplete or partial information in a multi-partite quantum networks.
A. Furusawa +9 more
core +1 more source
Dynamic Multi-secret Sharing Scheme in Vector Space Without Trusted Center [PDF]
The existing secret sharing scheme in the vector space cannot achieve the secret share update or the dynamic addition and deletion of members,and it is hard to ensure the existence of trusted center,so a multi-secret sharing scheme without trusted center
WANG Yuli,DU Weizhang
doaj +1 more source
Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm
Reversible Data Hiding in Encrypted Image (RDHEI) is a technology for embedding secret information in an encrypted image. It allows the extraction of secret information and lossless decryption and the reconstruction of the original image.
Chi-Yao Weng, Cheng-Hsing Yang
doaj +1 more source
Multi-party Quantum Computation [PDF]
We investigate definitions of and protocols for multi-party quantum computing in the scenario where the secret data are quantum systems. We work in the quantum information-theoretic model, where no assumptions are made on the computational power of the ...
Smith, Adam
core +4 more sources
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting.
Hossein Pilaram +2 more
doaj +1 more source
Conjunctive Hierarchical Multi-Secret Sharing Scheme using Elliptic Curves
In the present paper, the authors provide a conjunctive hierarchical multi-secret sharing scheme using elliptic curves and bilinear pairings. The scheme distributes several secrets among users grouped in hierarchical levels, where only authorized subsets of users from each level can collaborate to reconstruct the secrets.
Chintamani, Mohan +2 more
openaire +1 more source
Experimental observation of four-photon entanglement from down-conversion [PDF]
We observe polarization-entanglement between four photons produced from a single down-conversion source. The non-classical correlations between the measurement results violate a generalized Bell inequality for four qubits.
Christian Kurtsiefer +7 more
core +2 more sources
New results and applications for multi-secret sharing schemes [PDF]
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some set , each one according to an access structure. The trivial solution to this problem is to run independent instances of a standard secret sharing scheme,
Herranz Sotoca, Javier +2 more
core +2 more sources
Fully privacy-preserving distributed optimization in power systems based on secret sharing
With the increasing development of smart grid, multi-party cooperative computation between several entities has become a typical characteristic of modern energy systems.
Nianfeng Tian +3 more
doaj +1 more source

