Results 1 to 10 of about 11,914 (236)
Rational quantum secret sharing. [PDF]
AbstractThe traditional quantum secret sharing does not succeed in the presence of rational participants. A rational participant’s motivation is to maximize his utility, and will try to get the secret alone. Therefore, in the reconstruction, no rational participant will send his share to others.
Qin H, Tang WKS, Tso R.
europepmc +5 more sources
Security of a kind of quantum secret sharing with entangled states [PDF]
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others’ cooperation.
Tian-Yin Wang +4 more
doaj +2 more sources
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation. [PDF]
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure.
Lifeng Yuan +4 more
doaj +2 more sources
A New Scheme for Lossless Meaningful Visual Secret Sharing by using XOR Properties [PDF]
In this paper, a novel scheme for lossless meaningful visual secret sharing using XOR properties is presented. In the first step, genetic algorithm with an appropriate proposed objective function created noisy share images.
Z. Mehrnahad +2 more
doaj +1 more source
Visual secret sharing and related Works -A Review [PDF]
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj +1 more source
Advance Sharing of Quantum Shares for Classical Secrets
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret sharing schemes. Classical secret sharing has been known to be able to distribute some shares before a given secret. On the other hand,
Rina Miyajima, Ryutaroh Matsumoto
doaj +1 more source
Secret Image Sharing Schemes: A Comprehensive Survey
The safeguarding of digitized data against unwanted access and modification has become an issue of utmost importance as a direct result of the rapid development of network technology and internet applications.
Sanchita Saha +4 more
doaj +1 more source
A Linear Algebraic Threshold Essential Secret Image Sharing Scheme
A secret sharing scheme allocates to each participant a share of a secret in such a way that authorized subsets of participants can reconstruct the secret, while shares of unauthorized subsets of participants provide no useful information about the ...
Mohammad Ghebleh +2 more
doaj +1 more source
An Implementation of Image Secret Sharing Scheme Based on Matrix Operations
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj +1 more source
Infinite secret sharing – Examples [PDF]
Abstract. The motivation for extending secret sharing schemes to cases when either the set of players is infinite or the domain from which the secret and/or the shares are drawn is infinite or both, is similar to the case when switching to abstract probability spaces from classical combinatorial probability.
Dibert Alexander, Csirmaz László
openaire +6 more sources

