Results 1 to 10 of about 11,914 (236)

Rational quantum secret sharing. [PDF]

open access: yesSci Rep, 2018
AbstractThe traditional quantum secret sharing does not succeed in the presence of rational participants. A rational participant’s motivation is to maximize his utility, and will try to get the secret alone. Therefore, in the reconstruction, no rational participant will send his share to others.
Qin H, Tang WKS, Tso R.
europepmc   +5 more sources

Security of a kind of quantum secret sharing with entangled states [PDF]

open access: yesScientific Reports, 2017
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others’ cooperation.
Tian-Yin Wang   +4 more
doaj   +2 more sources

Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation. [PDF]

open access: yesPLoS ONE, 2016
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure.
Lifeng Yuan   +4 more
doaj   +2 more sources

A New Scheme for Lossless Meaningful Visual Secret Sharing by using XOR Properties [PDF]

open access: yesJournal of Artificial Intelligence and Data Mining, 2023
In this paper, a novel scheme for lossless meaningful visual secret sharing using XOR properties is presented. In the first step, genetic algorithm with an appropriate proposed objective function created noisy share images.
Z. Mehrnahad   +2 more
doaj   +1 more source

Visual secret sharing and related Works -A Review [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj   +1 more source

Advance Sharing of Quantum Shares for Classical Secrets

open access: yesIEEE Access, 2022
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret sharing schemes. Classical secret sharing has been known to be able to distribute some shares before a given secret. On the other hand,
Rina Miyajima, Ryutaroh Matsumoto
doaj   +1 more source

Secret Image Sharing Schemes: A Comprehensive Survey

open access: yesIEEE Access, 2023
The safeguarding of digitized data against unwanted access and modification has become an issue of utmost importance as a direct result of the rapid development of network technology and internet applications.
Sanchita Saha   +4 more
doaj   +1 more source

A Linear Algebraic Threshold Essential Secret Image Sharing Scheme

open access: yesMathematics, 2022
A secret sharing scheme allocates to each participant a share of a secret in such a way that authorized subsets of participants can reconstruct the secret, while shares of unauthorized subsets of participants provide no useful information about the ...
Mohammad Ghebleh   +2 more
doaj   +1 more source

An Implementation of Image Secret Sharing Scheme Based on Matrix Operations

open access: yesMathematics, 2022
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj   +1 more source

Infinite secret sharing – Examples [PDF]

open access: yesJournal of Mathematical Cryptology, 2014
Abstract. The motivation for extending secret sharing schemes to cases when either the set of players is infinite or the domain from which the secret and/or the shares are drawn is infinite or both, is similar to the case when switching to abstract probability spaces from classical combinatorial probability.
Dibert Alexander, Csirmaz László
openaire   +6 more sources

Home - About - Disclaimer - Privacy