Results 1 to 10 of about 32,260 (281)

Secret-Sharing for NP [PDF]

open access: yesJournal of Cryptology, 2014
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset ...
A. Beimel   +20 more
core   +7 more sources

Multiparty Quantum Secret Sharing [PDF]

open access: yesPhysical Review A, 2004
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a $(n,n)$-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons.
B. Schneier   +4 more
core   +2 more sources

Controlled Quantum Secret Sharing [PDF]

open access: yesPhysica Scripta, 2006
We present a new protocol in which a secret multiqubit quantum state $\ket{\Psi}$ is shared by $n$ players and $m$ controllers, where $\ket{\Psi}$ is the encoding state of a quantum secret sharing scheme.
Bennett C H Brassard G   +10 more
core   +2 more sources

Rational quantum secret sharing [PDF]

open access: yesScientific Reports, 2018
AbstractThe traditional quantum secret sharing does not succeed in the presence of rational participants. A rational participant’s motivation is to maximize his utility, and will try to get the secret alone. Therefore, in the reconstruction, no rational participant will send his share to others.
Qin, Huawang   +2 more
openaire   +4 more sources

Quantum secret sharing [PDF]

open access: yesPhysical Review A, 1998
Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. We show how this procedure can be implemented using GHZ states. In the quantum case the presence
A. K. Ekert   +13 more
core   +4 more sources

Security of a kind of quantum secret sharing with entangled states [PDF]

open access: yesScientific Reports, 2017
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others’ cooperation.
Tian-Yin Wang   +4 more
doaj   +2 more sources

Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation. [PDF]

open access: yesPLoS ONE, 2016
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure.
Lifeng Yuan   +4 more
doaj   +2 more sources

A New Scheme for Lossless Meaningful Visual Secret Sharing by using XOR Properties [PDF]

open access: yesJournal of Artificial Intelligence and Data Mining, 2023
In this paper, a novel scheme for lossless meaningful visual secret sharing using XOR properties is presented. In the first step, genetic algorithm with an appropriate proposed objective function created noisy share images.
Z. Mehrnahad   +2 more
doaj   +1 more source

Visual secret sharing and related Works -A Review [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj   +1 more source

Advance Sharing of Quantum Shares for Classical Secrets

open access: yesIEEE Access, 2022
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret sharing schemes. Classical secret sharing has been known to be able to distribute some shares before a given secret. On the other hand,
Rina Miyajima, Ryutaroh Matsumoto
doaj   +1 more source

Home - About - Disclaimer - Privacy