Results 51 to 60 of about 1,065 (175)
Proposal for quantum rational secret sharing [PDF]
A rational secret sharing scheme is a game in which each party responsible for reconstructing a secret tries to maximize his utility by obtaining the secret alone. Quantum secret sharing schemes, either derived from quantum teleportation or from quantum error correcting code, do not succeed when we assume rational participants.
Maitra, Arpita +3 more
openaire +2 more sources
Quantum communications can be conveniently implemented by two participants, but quantum secret key sharing (QSS) through multi-participant communication seems difficult in practice.
Yun Mao, Yiwu Zhu, Yijun Wang, Ying Guo
doaj +1 more source
Structural Mechanism of an Efficacy Photoswitch Targeting the β2‐adrenergic Receptor
Time‐resolved structures from x‐ray free‐electron laser measurements combined with cellular assays demonstrate how the photoswitchable β‐blocker photoazolol‐1 acts as an efficacy switch of β2‐adrenergic receptor function. Light‐induced ligand repositioning shifts activity from inverse agonism toward neutral antagonism by altering local helical ...
Robin Stipp +29 more
wiley +1 more source
Counterfactual Quantum Secret Sharing
The emerging quantum technology has highlighted the necessity for secure and efficient secret sharing in quantum networks. In this paper, we introduce a verifiable multiparty counterfactual quantum secret sharing (QSS) protocol, enhancing security and efficiency. This QSS protocol utilizes a low-depth quantum circuit to encrypt and decrypt information,
Nomi Lae +6 more
openaire +2 more sources
Advance Sharing of Quantum Shares for Quantum Secrets
Secret sharing is a cryptographic scheme to encode a secret to multiple shares being distributed to participants, so that only qualified sets of participants can restore the original secret from their shares. When we encode a secret by a secret sharing scheme and distribute shares, sometimes not all participants are accessible, and it is desirable to ...
Mamoru SHIBATA, Ryutaroh MATSUMOTO
openaire +2 more sources
Verifiable (n,n) Threshold Quantum Secret Sharing Scheme [PDF]
This paper constructs a class of verifiable secret sharing scheme based on Chinese Remainder Theorem and Bell states.In the distribution phase,Alice distributes the shares to the participants through the quantum secure channel.In the recovery phase,Alice
MA Min,LI Zhihui,XU Tingting
doaj +1 more source
Continuous-variable ramp quantum secret sharing with Gaussian states and operations
We aim to quantify and mitigate quantum-information leakage in continuous-variable quantum secret sharing (CV QSS). Here we introduce a technique for certifying CV ramp quantum secret-sharing (RQSS) schemes in the framework of quantum interactive-proof ...
Masoud Habibidavijani, Barry C Sanders
doaj +1 more source
Quantum Secret Aggregation Utilizing a Network of Agents
Suppose that the renowned spymaster Alice controls a network of spies who all happen to be deployed in different geographical locations. Let us further assume that all spies have managed to get their hands on a small, albeit incomplete by itself, secret,
Michael Ampatzis, Theodore Andronikos
doaj +1 more source
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino +2 more
wiley +1 more source
Tablets submitted to drug checking services that were found to contain bromazolam. Over half of these counterfeit tablets mimicked the appearance of licensed formulations (e.g., alprazolam Xanax bars and diazepam Roche 10 mg pills). Bromazolam is now the most commonly detected street benzodiazepine in drug poisoning deaths in the United Kingdom ...
Matthew Gardner +9 more
wiley +1 more source

