Results 41 to 50 of about 1,240,487 (287)
An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core
Random coding for sharing bosonic quantum secrets [PDF]
We consider a protocol for sharing quantum states using continuous variable systems. Specifically we introduce an encoding procedure where bosonic modes in arbitrary secret states are mixed with several ancillary squeezed modes through a passive ...
Arzani, Francesco +3 more
core +4 more sources
Unravelling the Secret of Sulfur Confinement and High Sulfur Utilization in Hybrid Sulfur‐Carbons
Thermal condensation of inverse vulcanized sulfur‐carbon hybrids enables a bottom‐up sulfur confinement strategy, in which a protective carbon phase is progressively constructed around sulfur species. The resulting carbon nanodomains covalently tether sulfur chains and stabilize radical intermediates. This integrated architecture effectively suppresses
Tim Horner +9 more
wiley +1 more source
New Protocols and Lower Bound for Quantum Secret Sharing with Graph States
We introduce a new family of quantum secret sharing protocols with limited quantum resources which extends the protocols proposed by Markham and Sanders and by Broadbent, Chouha, and Tapp.
A. Ekert +14 more
core +3 more sources
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Images of the dead (body) and the missing corpse in the Book of Job
The Song of Songs is regarding Eros, whereas the Book of Job seems to be about Thanatos. Despite the dominance of the theme of death in this biblical book, no word for a corpse or even a dead body occurs. Absence is, however, hermeneutically so important
Pieter van der Zwan
doaj +1 more source
Steganography is the process of hiding secret information by embedding it in an "innocent" message. We present protocols for hiding quantum information in a codeword of a quantum error-correcting code passing through a channel.
Brun, Todd A., Shaw, Bilal A.
core +1 more source
Asymmetry in Skipping Enhances Viability Against Control Input Noise
Quadruped animals use asymmetric galloping gaits at high speeds, yet the functional role of this asymmetry remains unclear. This study shows that left–right asymmetry in touchdown angles enhances robustness to control noise. Using a simple two‐legged locomotion model and viability theory, it demonstrates that asymmetric skipping substantially enlarges ...
Yuichi Ambe, Alvin So, Shinya Aoi
wiley +1 more source
Quantum secret sharing without entanglement
After analysing the main quantum secret sharing protocol based on the entanglement states, we propose an idea to directly encode the qubit of quantum key distributions, and then present a quantum secret sharing scheme where only product states are ...
Bagherinezhad +17 more
core +1 more source
Cet article est un compte-rendu du livre : Sigila, n° 11, « Tonalités secrètes », Gris-France, printemps-été 2003.
openaire +1 more source

