Results 181 to 190 of about 375,511 (221)

Secure latent Dirichlet allocation. [PDF]

open access: yesFront Digit Health
Veugen T   +3 more
europepmc   +1 more source

Secret Sharing System and Secret Sharing Matrix

2009 International Conference on Computational Intelligence and Security, 2009
To make the secret sharing management more effective and safe, based on the (k, n) threshold secret sharing scheme, this article propose a new concept of generalized (k, n)-secret sharing matrix, and proposed a more safe (t, k, n) threshold secret sharing scheme by generalizing the (t, k, n) threshold secret sharing matrix.
Lingyun Li   +3 more
openaire   +2 more sources

Shared Secret Reconstruction

Designs, Codes and Cryptography, 1998
Traditional approaches to the secret sharing problem are focused to the problem of how to divide a secret into shares distributed among a set of users in such a way that only a qualified subset of users can reconstruct the secret while any unqualified group of users have no information about the secret.
Jingmin He, Ed Dawson
openaire   +1 more source

Probability of shares in secret sharing schemes

Information Processing Letters, 1999
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo   +2 more
openaire   +3 more sources

On secret sharing systems

IEEE Transactions on Information Theory, 1983
Summary: A ``secret sharing system'' permits a secret to be shared among \(n\) trustees in such a way that any \(k\) of them can recover the secret, but any \(k-1\) have complete uncertainty about it. A linear coding scheme for secret sharing is exhibited which subsumes the polynomial interpolation method proposed by Shamir and can also be viewed as a ...
Jonathan W. Greene   +2 more
openaire   +2 more sources

On secret sharing schemes

Information Processing Letters, 1998
A secret sharing scheme is a protocol to share a secret s among a set of participants P in such a way that only qualified subsets of P can reconstruct the value of s whereas any other subset of P, non-qualified to know s, cannot determine anything about the value of the secret.
BLUNDO, Carlo   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy