Results 41 to 50 of about 211,108 (260)
An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core
Secret Sharing with a Single d-level Quantum System
We give an example of a wide class of problems for which quantum information protocols based on multi-system entanglement can be mapped into much simpler ones involving one system. Secret sharing is a cryptographic primitive which plays a central role in
Bourennane, Mohamed +3 more
core +1 more source
Osteosarcoma is the most common primary bone tumor with limited treatment options and a terrible prognosis. This review provides a comprehensive summary of the recent development of osteoimmunomodulatory implants for post‐operative osteosarcoma treatment, of which the potential utility in evoking durable anti‐osteosarcoma immunity and accelerating bone
Yilong Dong +6 more
wiley +1 more source
Dynamically Updatable Multi-secret Sharing Scheme Without Trusted Center [PDF]
General dynamically updatable multi-secret sharing schemes require the participation of a trusted center,and the problems of adding or deleting several members or secrets simultaneously are not solved.A new multi-secret sharing scheme without trusted ...
GU Ting,DU Weizhang
doaj +1 more source
An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core +1 more source
Quantum secret sharing between multi-party and multi-party without entanglement
We propose a quantum secret sharing protocol between multi-party ($m$ members in group 1) and multi-party ($n$ members in group 2) using a sequence of single photons.
B. Schneier +6 more
core +1 more source
BCR sequencing and subclone analysis correlated immunoglobulin (Ig) chain loss in dysfunctional hybridomas with disrupted monoclonal antibody homeostasis. Proteomics‐guided CRISPR/Cas9 editing revealed that the unfolded protein response (UPR) regulates aberrant Ig synthesis.
Rubing Zou +9 more
wiley +1 more source
Schematic illustration of SiNDs composite materials synthesis and its internal photophysical process mechanism. And an AI‐assisted dynamic information encryption process. ABSTRACT Persistent luminescence materials typically encounter an intrinsic trade‐off between high phosphorescence quantum yield (PhQY) and ultralong phosphorescence lifetime.
Yulu Liu +9 more
wiley +1 more source
DR-SISM: A dual reversible secret image sharing mechanism
Secret image sharing (SIS) technology has received wide attention from researchers due to its multi-party management of secret information. Traditional SIS algorithms usually convert secret information into the shares of noise-like images, which may ...
Ziye Yuan +5 more
doaj +1 more source
Secure secret sharing in the cloud [PDF]
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core +1 more source

