Results 51 to 60 of about 1,065 (175)

Proposal for quantum rational secret sharing [PDF]

open access: yesPhysical Review A, 2015
A rational secret sharing scheme is a game in which each party responsible for reconstructing a secret tries to maximize his utility by obtaining the secret alone. Quantum secret sharing schemes, either derived from quantum teleportation or from quantum error correcting code, do not succeed when we assume rational participants.
Maitra, Arpita   +3 more
openaire   +2 more sources

Continuous Variable Quantum Secret Sharing with Security Enhancement in Practical Quantum Communications

open access: yesMathematics, 2022
Quantum communications can be conveniently implemented by two participants, but quantum secret key sharing (QSS) through multi-participant communication seems difficult in practice.
Yun Mao, Yiwu Zhu, Yijun Wang, Ying Guo
doaj   +1 more source

Structural Mechanism of an Efficacy Photoswitch Targeting the β2‐adrenergic Receptor

open access: yesAngewandte Chemie International Edition, EarlyView.
Time‐resolved structures from x‐ray free‐electron laser measurements combined with cellular assays demonstrate how the photoswitchable β‐blocker photoazolol‐1 acts as an efficacy switch of β2‐adrenergic receptor function. Light‐induced ligand repositioning shifts activity from inverse agonism toward neutral antagonism by altering local helical ...
Robin Stipp   +29 more
wiley   +1 more source

Counterfactual Quantum Secret Sharing

open access: yesIEEE Transactions on Communications
The emerging quantum technology has highlighted the necessity for secure and efficient secret sharing in quantum networks. In this paper, we introduce a verifiable multiparty counterfactual quantum secret sharing (QSS) protocol, enhancing security and efficiency. This QSS protocol utilizes a low-depth quantum circuit to encrypt and decrypt information,
Nomi Lae   +6 more
openaire   +2 more sources

Advance Sharing of Quantum Shares for Quantum Secrets

open access: yesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Secret sharing is a cryptographic scheme to encode a secret to multiple shares being distributed to participants, so that only qualified sets of participants can restore the original secret from their shares. When we encode a secret by a secret sharing scheme and distribute shares, sometimes not all participants are accessible, and it is desirable to ...
Mamoru SHIBATA, Ryutaroh MATSUMOTO
openaire   +2 more sources

Verifiable (n,n) Threshold Quantum Secret Sharing Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
This paper constructs a class of verifiable secret sharing scheme based on Chinese Remainder Theorem and Bell states.In the distribution phase,Alice distributes the shares to the participants through the quantum secure channel.In the recovery phase,Alice
MA Min,LI Zhihui,XU Tingting
doaj   +1 more source

Continuous-variable ramp quantum secret sharing with Gaussian states and operations

open access: yesNew Journal of Physics, 2019
We aim to quantify and mitigate quantum-information leakage in continuous-variable quantum secret sharing (CV QSS). Here we introduce a technique for certifying CV ramp quantum secret-sharing (RQSS) schemes in the framework of quantum interactive-proof ...
Masoud Habibidavijani, Barry C Sanders
doaj   +1 more source

Quantum Secret Aggregation Utilizing a Network of Agents

open access: yesCryptography, 2023
Suppose that the renowned spymaster Alice controls a network of spies who all happen to be deployed in different geographical locations. Let us further assume that all spies have managed to get their hands on a small, albeit incomplete by itself, secret,
Michael Ampatzis, Theodore Andronikos
doaj   +1 more source

Green Innovation and Firm Efficiency: The Role of Institutional Quality in Italian High‐Tech Manufacturing Sectors

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino   +2 more
wiley   +1 more source

Bromazolam Tablet Quantification and Analysis of Post‐Mortem Cases From the National Programme on Substance Use Mortality (NPSUM)

open access: yesDrug Testing and Analysis, EarlyView.
Tablets submitted to drug checking services that were found to contain bromazolam. Over half of these counterfeit tablets mimicked the appearance of licensed formulations (e.g., alprazolam Xanax bars and diazepam Roche 10 mg pills). Bromazolam is now the most commonly detected street benzodiazepine in drug poisoning deaths in the United Kingdom ...
Matthew Gardner   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy