Results 61 to 70 of about 1,065 (175)
A Resilient Quantum Secret Sharing Scheme [PDF]
A resilient secret sharing scheme is supposed to generate the secret correctly even after some shares are damaged. In this paper, we show how quantum error correcting codes can be exploited to design a resilient quantum secret sharing scheme, where a quantum state is shared among more than one parties.
Maitra, Arpita, Paul, Goutam
openaire +3 more sources
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi +4 more
wiley +1 more source
The Bazaar as a Model for Knowledge Work
ABSTRACT This paper presents fieldwork that extends existing metaphors of knowledge work as a process shaped by hierarchical or market forces. A qualitative, ethnographic study of six knowledge‐intensive businesses in two countries identifies striking parallels with the Middle Eastern bazaar in contrast to Western impersonal markets and hierarchies. We
Reed Elliot Nelson +2 more
wiley +1 more source
A Novel Quantum Visual Secret Sharing Scheme
Inspired by Naor et al.'s visual secret sharing (VSS) scheme, a novel n out of n quantum visual secret sharing (QVSS) scheme is proposed, which consists of two phases: sharing process and recovering process. In the first process, the color information of
Wenjie Liu +4 more
doaj +1 more source
Tailoring Spatial Correlations With Quantum Interference
Imposing spatial structure on interfering photons fundamentally reshapes their correlations. By controlling the mutual distinguishability of two photons, we write and edit these correlations, encoding information that is invisible to conventional intensity measurements and revealed only through their joint behavior.
Carlo Schiano +5 more
wiley +1 more source
Quantum strongly secure ramp secret sharing [PDF]
Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together however, no information about the secret can be revealed ...
Zhang, Paul, Matsumoto, Ryutaroh
openaire +4 more sources
Assessing Capability Complexity Using Enterprise Architecture Framework
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley +1 more source
With a Great Story Comes Great Responsibility: Role of Narrative in Leadership Development
ABSTRACT Comic books reside uniquely within American culture. Historians have contended comics are more than just sequential artwork mixed with engaging stories, but rather, a framework by which the generations make sense of who they are. These stories are a reflection of cultural conscience; a lens through which we can view the world and a mirror ...
Sean Connable
wiley +1 more source
Quantum Security Computation on Shared Secrets [PDF]
Ouyang et al. proposed an $(n,n)$ threshold quantum secret sharing scheme, where the number of participants is limited to $n=4k+1,k\in Z^+$, and the security evaluation of the scheme was carried out accordingly. In this paper, we propose an $(n,n)$ threshold quantum secret sharing scheme for the number of participants $n$ in any case ( $n\in Z ...
Hai-Yan Bai, Zhi-Hui Li, Na Hao
openaire +2 more sources
Security of Verifiable Threshold Quantum Secret Sharing With Sequential Communication
A verifiable (t, n) threshold quantum secret sharing scheme with sequential communication was proposed recently. In this work, we analyze its security and then give two new participant attacks.
Xiaoqiu Cai +3 more
doaj +1 more source

