Fourier-based Function Secret Sharing with General Access Structure
Function secret sharing (FSS) scheme is a mechanism that calculates a function f(x) for x in {0,1}^n which is shared among p parties, by using distributed functions f_i:{0,1}^n -> G, where G is an Abelian group, while the function f:{0,1}^n -> G is kept ...
A Beimel +5 more
core +1 more source
A typology of schools across the four nations of the United Kingdom: Class, race and geography
Abstract In this paper we analyse the hierarchical field of schools across the United Kingdom during the transition to university and suggest that there are five socially distinct clusters of schools. Our five‐cluster typology of UK schools is composed of an established group of elite private and state schools, schools for the white rural and suburban ...
Sol Gamsu, Håkan Forsberg
wiley +1 more source
Breaking Rate-Distance Limitation of Measurement-Device-Independent Quantum Secret Sharing [PDF]
Chenlong Li +7 more
openalex +1 more source
CHURP: Dynamic-Committee Proactive Secret Sharing
We introduce CHURP (CHUrn-Robust Proactive secret sharing). CHURP enables secure secret-sharing in dynamic settings, where the committee of nodes storing a secret changes over time.
Sai Krishna Deepak Maram +6 more
semanticscholar +1 more source
The Visual Secret Sharing Scheme Based on the Rgb Color System [PDF]
The visual secret sharing (VSS) scheme is a method to maintain the confidentiality of a se-cret image by sharing it to some number participants.
Adithia, M. T. (Mariskha) +1 more
core
Secret Sharing LDPC Codes for the BPSK-constrained Gaussian Wiretap Channel
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presence of a wiretapper who observes the transmission through another Gaussian ...
Shea, John M. +2 more
core +1 more source
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source
Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang +3 more
doaj +1 more source
Cold atmospheric plasma‐mediated tumor microenvironment remodeling for cancer treatment
Schematic presentation of CAP‐mediated TME remodeling. This review summarizes recent efforts in cold atmospheric plasma (CAP) application in cancer treatment, highlighting the anticancer potential of CAP, molecular mechanisms, and future perspectives for further improvement and clinical translation.
Israr Khan +8 more
wiley +1 more source
A novel meaningful secret image sharing method based on Arabic letters
In recent years, the providing of information security for multimedia has become an important subject of study. Visual cryptography and secret sharing is protected image contents without using complex mathematically operators.
Derya Avci
doaj

