Results 11 to 20 of about 3,018,405 (324)
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation. [PDF]
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure.
Yuan L, Li M, Guo C, Choo KR, Ren Y.
europepmc +2 more sources
Security of a kind of quantum secret sharing with entangled states. [PDF]
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others’ cooperation.
Wang TY, Liu YZ, Wei CY, Cai XQ, Ma JF.
europepmc +2 more sources
Standard (3, 5)-threshold quantum secret sharing by maximally entangled 6-qubit states. [PDF]
Long Y, Zhang C, Sun Z.
europepmc +3 more sources
Experimental quantum secret sharing based on phase encoding of coherent states [PDF]
Quantum secret sharing (QSS) is one of the basic communication primitives in future quantum networks which addresses part of the basic cryptographic tasks of multiparty communication and computation. Nevertheless, it is a challenge to provide a practical
Ao Shen +8 more
semanticscholar +1 more source
A New Scheme for Lossless Meaningful Visual Secret Sharing by using XOR Properties [PDF]
In this paper, a novel scheme for lossless meaningful visual secret sharing using XOR properties is presented. In the first step, genetic algorithm with an appropriate proposed objective function created noisy share images.
Z. Mehrnahad +2 more
doaj +1 more source
A Novel Quantum Visual Secret Sharing Scheme [PDF]
Inspired by Naor et al.’s visual secret sharing (VSS) scheme, a novel $n$ out of $n$ quantum visual secret sharing (QVSS) scheme is proposed, which consists of two phases: sharing process and recovering process.
Wenjie Liu +4 more
semanticscholar +1 more source
Visual secret sharing and related Works -A Review [PDF]
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj +1 more source
Advance Sharing of Quantum Shares for Classical Secrets
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret sharing schemes. Classical secret sharing has been known to be able to distribute some shares before a given secret. On the other hand,
Rina Miyajima, Ryutaroh Matsumoto
doaj +1 more source
Secret Image Sharing Schemes: A Comprehensive Survey
The safeguarding of digitized data against unwanted access and modification has become an issue of utmost importance as a direct result of the rapid development of network technology and internet applications.
Sanchita Saha +4 more
doaj +1 more source
A Linear Algebraic Threshold Essential Secret Image Sharing Scheme
A secret sharing scheme allocates to each participant a share of a secret in such a way that authorized subsets of participants can reconstruct the secret, while shares of unauthorized subsets of participants provide no useful information about the ...
Mohammad Ghebleh +2 more
doaj +1 more source

