Results 21 to 30 of about 11,914 (236)
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret.
Komargodski, Ilan +2 more
openaire +3 more sources
Multiparty quantum secret sharing [PDF]
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a $(n,n)$-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons. We take advantage of this multiparty QSSCM scheme to establish a scheme of multiparty secret sharing of quantum information (SSQI),
Zhang, Zhan-jun +2 more
openaire +2 more sources
Lattice-based Threshold Secret Sharing Algorithm [PDF]
The secret sharing algorithm based on the traditional mathematical assumption is difficult to resist the attack of the quantum algorithm.Therefore,a lattice-based threshold secret sharing algorithm is proposed.The basic process of the secret sharing ...
ZHANG Hongjun,LIU Ke,MOU Zhansheng
doaj +1 more source
Simple Approach to Realizing Verifiable Secret Sharing for Secure Cloud System
In $(k, n)$ threshold secret sharing, a secret is converted into $n$ shares such that any threshold $k$ or more shares allow for the reconstruction of this secret; however, the total storage cost increases.
Keiichi Iwamura +1 more
doaj +1 more source
Boolean-Based (k, n, m) Multi-Secret Image Sharing
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property.
Chien-Chang Chen +2 more
doaj +1 more source
Secret Sharing With Public Reconstruction [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Beimel, Amos, Chor, Benny
openaire +1 more source
A novel carbon dots material (BUL‐CDs) with an initial afterglow brightness (406 cd m−2) far exceeding that of other afterglow luminescent materials was developed. Furthermore, the BUL‐CDs exhibited time‐dependent afterglow colors, excitation‐dependent afterglow colors, and thermochromic afterglow in response to triplet variables.
Yupeng Liu +13 more
wiley +2 more sources
(k,n) secret image sharing scheme capable of cheating detection
In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the ...
Yan-Xiao Liu +2 more
doaj +1 more source
Constructions of some secret sharing schemes based on linear codes [PDF]
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any
Ratseev, Sergey Mihailovich
doaj +1 more source
Probabilistic Secret Sharing [PDF]
In classical secret sharing schemes a dealer shares a secret among a set of participants in such a way that qualified subsets can reconstruct the secret, while forbidden ones do not get any kind of information about it. The basic parameter to optimize is the size of the shares, that is, the amount of secret information that the dealer has to give to ...
D’Arco, Paolo +4 more
openaire +2 more sources

