Results 11 to 20 of about 375,511 (221)

Efficient multiparty quantum-secret-sharing schemes [PDF]

open access: greenPhysical Review A, 2004
In this work, we generalize the quantum secret sharing scheme of Hillary, Bu\v{z}ek and Berthiaume[Phys. Rev. A59, 1829(1999)] into arbitrary multi-parties. Explicit expressions for the shared secret bit is given.
Gui Lu Long, Fu-Guo Deng, Jian-Wei Pan
exaly   +4 more sources

Secret-Sharing for NP [PDF]

open access: yesJournal of Cryptology, 2014
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret.
Moni Naor, Eylon Yogev, Ilan Komargodski
openaire   +8 more sources

Secret Sharing and Shared Information [PDF]

open access: yesEntropy, 2017
Secret sharing is a cryptographic discipline in which the goal is to distribute information about a secret over a set of participants in such a way that only specific authorized combinations of participants together can reconstruct the secret. Thus, secret sharing schemes are systems of variables in which it is very clearly specified which subsets have
Rauh, Johannes
openaire   +7 more sources

Secure Secret Sharing in the Cloud [PDF]

open access: yes2017 IEEE International Symposium on Multimedia (ISM), 2017
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An
Chang, Ching-Chun, Li, Chang-Tsun
openaire   +4 more sources

Infinite secret sharing – Examples [PDF]

open access: yesJournal of Mathematical Cryptology, 2014
Abstract. The motivation for extending secret sharing schemes to cases when either the set of players is infinite or the domain from which the secret and/or the shares are drawn is infinite or both, is similar to the case when switching to abstract probability spaces from classical combinatorial probability.
László Csirmaz, Alexander Dibert
core   +10 more sources

Experimental Demonstration of Four-Party Quantum Secret Sharing [PDF]

open access: green, 2007
Secret sharing is a multiparty cryptographic task in which some secret information is splitted into several pieces which are distributed among the participants such that only an authorized set of participants can reconstruct the original secret.
Sascha Gaertner   +3 more
openalex   +4 more sources

Multiparty quantum secret sharing [PDF]

open access: green, 2005
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a $(n,n)$-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons.
Zhanjun Zhang, Yong Li, Zhong‐Xiao Man
openalex   +3 more sources

Advance Sharing of Quantum Shares for Classical Secrets

open access: yesIEEE Access, 2022
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret sharing schemes. Classical secret sharing has been known to be able to distribute some shares before a given secret. On the other hand,
Rina Miyajima, Ryutaroh Matsumoto
doaj   +1 more source

Visual secret sharing and related Works -A Review [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj   +1 more source

Secret Image Sharing Schemes: A Comprehensive Survey

open access: yesIEEE Access, 2023
The safeguarding of digitized data against unwanted access and modification has become an issue of utmost importance as a direct result of the rapid development of network technology and internet applications.
Sanchita Saha   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy