Results 71 to 80 of about 211,819 (273)
Quantum secret sharing between m-party and n-party with six states
We propose a quantum secret sharing scheme between $m$-party and $n$-party using three conjugate bases, i.e. six states. A sequence of single photons, each of which is prepared in one of the six states, is used directly to encode classical information in
A. Karlsson +26 more
core +1 more source
A scientometric analysis of 2449 journal articles and a comprehensive review of 336 papers were conducted, discussing and identifying challenges and research gaps in rockburst prediction and prevention and proposing an ontology‐based framework for better decision‐making in underground excavations. Abstract With underground engineering projects becoming
Hongchuan Yan +6 more
wiley +1 more source
Dynamic hierarchical quantum information sharing protocol
Quantum secret sharing (QSS) is one important branch of quantum cryptography.Based on the studies of multi-shared quantum bits,a new dynamic quantum bit sharing protocol was proposed.The participation of the shared members is hierarchical in this ...
Heng-yue JIA +4 more
doaj +3 more sources
Generic Secure Repair for Distributed Storage [PDF]
This paper studies the problem of repairing secret sharing schemes, i.e., schemes that encode a message into $n$ shares, assigned to $n$ nodes, so that any $n-r$ nodes can decode the message but any colluding $z$ nodes cannot infer any information about ...
Bruck, Jehoshua, Huang, Wentao
core +2 more sources
Improving the security of multiparty quantum secret sharing against Trojan horse attack
We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li and Man [Phys. Rev. A \textbf{71}, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob ...
Deng, Fu-Guo +3 more
core +1 more source
This paper explores how climate‐resilient technologies, such as smart grids, digital twins, and self‐healing materials, can enhance urban resilience. It highlights the urgent need for proactive planning, public‐private collaboration, and data‐driven innovation to future‐proof underground infrastructure amid accelerating climate and urban pressures ...
Kai Chen Goh +12 more
wiley +1 more source
B1 is bord width 1, B2 is bord width 2, L is the pillar length, W is the pillar width, red color and letter A represent the pillars, and white color and number 1 represent excavated areas. Pstress is the average pillar stress; σv is the vertical component of the virgin stress, MPa; and e is the areal extraction ratio. e = B o B o + B P ${\rm{e}}=\frac{{
Tawanda Zvarivadza +4 more
wiley +1 more source
Алгоритм формирования матриц над примарным кольцом вычетов для построения протоколов множественного разделения секрета, реализующих заданную иерархию доступа [PDF]
Perfect linear multi-secret sharing schemes over primary residue ring construction algorithm is proposed. Early known secret sharing schemes over finite field construction method is generalized by proposed algorithm.
Волошин, Андрей
core
Privacy of the outsourced data is one of the major challenge.Insecurity of the network environment and untrustworthiness of the service providers are obstacles of making the database as a service.Collection and storage of personally identifiable ...
Binu, V. P. +2 more
core +1 more source
This study demonstrates the feasibility of an underground closed‐loop thermal storage facility at a post‐mining site, intended for seasonal heat energy storage. Its principal design shows water flow directions in winter and summer (1, 2), heat pumps (3), an upper water reservoir (4), and connecting pipes (5).
Dmytro Rudakov, Oleksandr Inkin
wiley +1 more source

