Results 201 to 210 of about 11,914 (236)
HCSS-GB and IBESS: Secret Image Sharing Schemes with Enhanced Shadow Management and Visual-Gradient Access Control. [PDF]
Pan H, Yan W, Wang R, Yu Y.
europepmc +1 more source
Quantum teleportation of shared quantum secret in amplitude-damping channel. [PDF]
Aisan Y +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Secret Sharing System and Secret Sharing Matrix
2009 International Conference on Computational Intelligence and Security, 2009To make the secret sharing management more effective and safe, based on the (k, n) threshold secret sharing scheme, this article propose a new concept of generalized (k, n)-secret sharing matrix, and proposed a more safe (t, k, n) threshold secret sharing scheme by generalizing the (t, k, n) threshold secret sharing matrix.
Guangliang Liu +3 more
openaire +1 more source
Overcoming security limitations of Secret Share techniques: the Nested Secret Share
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021Secret Share (SS) is becoming a very hot topic within the scientific community. It allows us to split a secret into fragments and to share them among parties in such a way that a subset can recompose the original information. SS techniques assure a high redundancy degree, but the security level is fixed.
Galletta A. +4 more
openaire +1 more source
Experimental quantum secret sharing
Fortschritte der Physik, 2006AbstractWe consider two simple and practical protocols for multiparty communication and show their experimental realization. These protocols deal with the task of secret sharing in which a secret message is split among several parties in a way that its reconstruction requires their mutual collaboration.
Schmid, C. +6 more
openaire +3 more sources
Information Processing Letters, 1998
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo +2 more
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo +2 more
openaire +2 more sources
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
We continue the study of Homomorphic Secret Sharing (HSS), recently introduced by Boyle et al. (Crypto 2016, Eurocrypt 2017). A (2-party) HSS scheme splits an input x into shares (x0,x1) such that (1) each share computationally hides x, and (2) there exists an efficient homomorphic evaluation algorithm $\Eval$ such that for any function (or "program ...
Boyle, Elette +4 more
openaire +2 more sources
We continue the study of Homomorphic Secret Sharing (HSS), recently introduced by Boyle et al. (Crypto 2016, Eurocrypt 2017). A (2-party) HSS scheme splits an input x into shares (x0,x1) such that (1) each share computationally hides x, and (2) there exists an efficient homomorphic evaluation algorithm $\Eval$ such that for any function (or "program ...
Boyle, Elette +4 more
openaire +2 more sources
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018
Confidentiality is a fundamental goal in many security contexts. Deception is another goal in which the intention is to mislead adversaries, for example by planting false information in a system. In this paper, we consider an approach that combines confidentiality and deception using secret sharing, which has traditionally been used strictly for ...
Lei Zhang, Douglas Blough
openaire +1 more source
Confidentiality is a fundamental goal in many security contexts. Deception is another goal in which the intention is to mislead adversaries, for example by planting false information in a system. In this paper, we consider an approach that combines confidentiality and deception using secret sharing, which has traditionally been used strictly for ...
Lei Zhang, Douglas Blough
openaire +1 more source

