Results 91 to 100 of about 3,018,405 (324)

Fourier-based Function Secret Sharing with General Access Structure

open access: yes, 2017
Function secret sharing (FSS) scheme is a mechanism that calculates a function f(x) for x in {0,1}^n which is shared among p parties, by using distributed functions f_i:{0,1}^n -> G, where G is an Abelian group, while the function f:{0,1}^n -> G is kept ...
A Beimel   +5 more
core   +1 more source

A typology of schools across the four nations of the United Kingdom: Class, race and geography

open access: yesBritish Educational Research Journal, EarlyView.
Abstract In this paper we analyse the hierarchical field of schools across the United Kingdom during the transition to university and suggest that there are five socially distinct clusters of schools. Our five‐cluster typology of UK schools is composed of an established group of elite private and state schools, schools for the white rural and suburban ...
Sol Gamsu, Håkan Forsberg
wiley   +1 more source

Breaking Rate-Distance Limitation of Measurement-Device-Independent Quantum Secret Sharing [PDF]

open access: green, 2022
Chenlong Li   +7 more
openalex   +1 more source

CHURP: Dynamic-Committee Proactive Secret Sharing

open access: yesIACR Cryptology ePrint Archive, 2019
We introduce CHURP (CHUrn-Robust Proactive secret sharing). CHURP enables secure secret-sharing in dynamic settings, where the committee of nodes storing a secret changes over time.
Sai Krishna Deepak Maram   +6 more
semanticscholar   +1 more source

The Visual Secret Sharing Scheme Based on the Rgb Color System [PDF]

open access: yes, 2017
The visual secret sharing (VSS) scheme is a method to maintain the confidentiality of a se-cret image by sharing it to some number participants.
Adithia, M. T. (Mariskha)   +1 more
core  

Secret Sharing LDPC Codes for the BPSK-constrained Gaussian Wiretap Channel

open access: yes, 2011
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presence of a wiretapper who observes the transmission through another Gaussian ...
Shea, John M.   +2 more
core   +1 more source

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme

open access: yesIEEE Access, 2020
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang   +3 more
doaj   +1 more source

Cold atmospheric plasma‐mediated tumor microenvironment remodeling for cancer treatment

open access: yesBMEMat, EarlyView.
Schematic presentation of CAP‐mediated TME remodeling. This review summarizes recent efforts in cold atmospheric plasma (CAP) application in cancer treatment, highlighting the anticancer potential of CAP, molecular mechanisms, and future perspectives for further improvement and clinical translation.
Israr Khan   +8 more
wiley   +1 more source

A novel meaningful secret image sharing method based on Arabic letters

open access: yesKuwait Journal of Science, 2016
In recent years, the providing of information security for multimedia has become an important subject of study. Visual cryptography and secret sharing is protected image contents without using complex mathematically operators.
Derya Avci
doaj  

Home - About - Disclaimer - Privacy