Results 91 to 100 of about 375,511 (221)
Robust sharing of secrets when the dealer is honest or cheating [PDF]
Tal Rabin
openalex +1 more source
Bipartite secret sharing and staircases
Bipartite secret sharing schemes have a bipartite access structure in which the set of participants is divided into two parts and all participants in the same part play an equivalent role. Such a bipartite scheme can be described by a \emph{staircase}: the collection of its minimal points.
Csirmaz, Laszlo +2 more
openaire +3 more sources
Significant Secret Image Sharing Scheme Based on Boolean Operation
Traditionally, (k, n) secret image sharing is an approach of breaking down a secret image into n number of shadow images to assign them to n number of users, so that any k or more then k users can bring back the secret image.
Verma Monu, Rani Rajneesh
doaj +1 more source
SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier. [PDF]
Krishna DP +6 more
europepmc +1 more source
A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity. [PDF]
Tian Y +5 more
europepmc +1 more source
A Kind of (t, n) Threshold Quantum Secret Sharing with Identity Authentication. [PDF]
Meng D, Li Z, Luo S, Han Z.
europepmc +1 more source
High performance image steganography integrating IWT and Hamming code within secret sharing
Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct ...
Zahra Saeidi +4 more
doaj +1 more source
Multi-Party Quantum Secret Sharing Based on GHZ State. [PDF]
Li Z, Jiang X, Liu L.
europepmc +1 more source
Teleportation and secret sharing with pure entangled states [PDF]
Somshubhro Bandyopadhyay
openalex +1 more source

