Results 41 to 50 of about 211,108 (260)

An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]

open access: yes, 2014
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core  

Secret Sharing with a Single d-level Quantum System

open access: yes, 2015
We give an example of a wide class of problems for which quantum information protocols based on multi-system entanglement can be mapped into much simpler ones involving one system. Secret sharing is a cryptographic primitive which plays a central role in
Bourennane, Mohamed   +3 more
core   +1 more source

Engineering Osteoimmune Responses with Functionalized Orthopedic Implants for Post‐Operative Osteosarcoma Treatment

open access: yesAdvanced Science, EarlyView.
Osteosarcoma is the most common primary bone tumor with limited treatment options and a terrible prognosis. This review provides a comprehensive summary of the recent development of osteoimmunomodulatory implants for post‐operative osteosarcoma treatment, of which the potential utility in evoking durable anti‐osteosarcoma immunity and accelerating bone
Yilong Dong   +6 more
wiley   +1 more source

Dynamically Updatable Multi-secret Sharing Scheme Without Trusted Center [PDF]

open access: yesJisuanji gongcheng, 2016
General dynamically updatable multi-secret sharing schemes require the participation of a trusted center,and the problems of adding or deleting several members or secrets simultaneously are not solved.A new multi-secret sharing scheme without trusted ...
GU Ting,DU Weizhang
doaj   +1 more source

An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]

open access: yes, 2012
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core   +1 more source

Quantum secret sharing between multi-party and multi-party without entanglement

open access: yes, 2005
We propose a quantum secret sharing protocol between multi-party ($m$ members in group 1) and multi-party ($n$ members in group 2) using a sequence of single photons.
B. Schneier   +6 more
core   +1 more source

Quantitative Proteomics and CRISPR/Cas9 Editing Reveal UPR‐Mediated Control of Immunoglobulin Homeostasis in Hybridomas

open access: yesAdvanced Science, EarlyView.
BCR sequencing and subclone analysis correlated immunoglobulin (Ig) chain loss in dysfunctional hybridomas with disrupted monoclonal antibody homeostasis. Proteomics‐guided CRISPR/Cas9 editing revealed that the unfolded protein response (UPR) regulates aberrant Ig synthesis.
Rubing Zou   +9 more
wiley   +1 more source

Urea‐Formaldehyde Resin Confined Silicon Nanodots Composites: High‐Performance and Ultralong Persistent Luminescence for Dynamic AI Information Encryption

open access: yesAdvanced Science, EarlyView.
Schematic illustration of SiNDs composite materials synthesis and its internal photophysical process mechanism. And an AI‐assisted dynamic information encryption process. ABSTRACT Persistent luminescence materials typically encounter an intrinsic trade‐off between high phosphorescence quantum yield (PhQY) and ultralong phosphorescence lifetime.
Yulu Liu   +9 more
wiley   +1 more source

DR-SISM: A dual reversible secret image sharing mechanism

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Secret image sharing (SIS) technology has received wide attention from researchers due to its multi-party management of secret information. Traditional SIS algorithms usually convert secret information into the shares of noise-like images, which may ...
Ziye Yuan   +5 more
doaj   +1 more source

Secure secret sharing in the cloud [PDF]

open access: yes, 2017
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core   +1 more source

Home - About - Disclaimer - Privacy