Results 1 to 10 of about 375,511 (221)
How to Share a Quantum Secret [PDF]
We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains absolutely no information about the secret. We show that the only constraint on the existence of threshold
Richard Cleve +2 more
core +5 more sources
In this paper we show how to divide data D into n pieces in such a way that D is easily reconstructable from any k pieces, but even complete knowledge of k - 1 pieces reveals absolutely no information about D
Adi Shamir
openalex +4 more sources
On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme [PDF]
Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS) schemes decode the secret without computation, but each share is m times as big as the original ...
Daoshun Wang, Feng Yi
doaj +4 more sources
On Cheating Immune Secret Sharing [PDF]
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj +5 more sources
On identification secret sharing schemes
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ning Cai, Kwok‐Yan Lam
openalex +3 more sources
Essential Multi-Secret Image Sharing for Sensor Images [PDF]
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj +2 more sources
Security of a kind of quantum secret sharing with entangled states [PDF]
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others’ cooperation.
Tian-Yin Wang +4 more
doaj +2 more sources
Optical secret sharing with cascaded metasurface holography [PDF]
Philip Georgi, Qunshuo Wei, Basudeb Sain
exaly +2 more sources
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation. [PDF]
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure.
Lifeng Yuan +4 more
doaj +2 more sources
A New Scheme for Lossless Meaningful Visual Secret Sharing by using XOR Properties [PDF]
In this paper, a novel scheme for lossless meaningful visual secret sharing using XOR properties is presented. In the first step, genetic algorithm with an appropriate proposed objective function created noisy share images.
Z. Mehrnahad +2 more
doaj +1 more source

