Results 1 to 10 of about 375,511 (221)

How to Share a Quantum Secret [PDF]

open access: greenPhysical Review Letters, 1999
We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains absolutely no information about the secret. We show that the only constraint on the existence of threshold
Richard Cleve   +2 more
core   +5 more sources

How to share a secret [PDF]

open access: bronzeCommunications of the ACM, 1979
In this paper we show how to divide data D into n pieces in such a way that D is easily reconstructable from any k pieces, but even complete knowledge of k - 1 pieces reveals absolutely no information about D
Adi Shamir
openalex   +4 more sources

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme [PDF]

open access: yesEURASIP Journal on Advances in Signal Processing, 2010
Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS) schemes decode the secret without computation, but each share is m times as big as the original ...
Daoshun Wang, Feng Yi
doaj   +4 more sources

On Cheating Immune Secret Sharing [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +5 more sources

On identification secret sharing schemes

open access: bronzeInformation and Computation, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ning Cai, Kwok‐Yan Lam
openalex   +3 more sources

Essential Multi-Secret Image Sharing for Sensor Images [PDF]

open access: yesJournal of Imaging
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj   +2 more sources

Security of a kind of quantum secret sharing with entangled states [PDF]

open access: yesScientific Reports, 2017
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others’ cooperation.
Tian-Yin Wang   +4 more
doaj   +2 more sources

Optical secret sharing with cascaded metasurface holography [PDF]

open access: yesScience Advances, 2021
Philip Georgi, Qunshuo Wei, Basudeb Sain
exaly   +2 more sources

Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation. [PDF]

open access: yesPLoS ONE, 2016
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure.
Lifeng Yuan   +4 more
doaj   +2 more sources

A New Scheme for Lossless Meaningful Visual Secret Sharing by using XOR Properties [PDF]

open access: yesJournal of Artificial Intelligence and Data Mining, 2023
In this paper, a novel scheme for lossless meaningful visual secret sharing using XOR properties is presented. In the first step, genetic algorithm with an appropriate proposed objective function created noisy share images.
Z. Mehrnahad   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy