Results 211 to 220 of about 11,934 (254)
Some of the next articles are maybe not open access.
Experimental quantum secret sharing
Fortschritte der Physik, 2006AbstractWe consider two simple and practical protocols for multiparty communication and show their experimental realization. These protocols deal with the task of secret sharing in which a secret message is split among several parties in a way that its reconstruction requires their mutual collaboration.
Schmid, C. +6 more
openaire +3 more sources
Information Processing Letters, 1998
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo +2 more
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo +2 more
openaire +2 more sources
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
We continue the study of Homomorphic Secret Sharing (HSS), recently introduced by Boyle et al. (Crypto 2016, Eurocrypt 2017). A (2-party) HSS scheme splits an input x into shares (x0,x1) such that (1) each share computationally hides x, and (2) there exists an efficient homomorphic evaluation algorithm $\Eval$ such that for any function (or "program ...
Boyle, Elette +4 more
openaire +2 more sources
We continue the study of Homomorphic Secret Sharing (HSS), recently introduced by Boyle et al. (Crypto 2016, Eurocrypt 2017). A (2-party) HSS scheme splits an input x into shares (x0,x1) such that (1) each share computationally hides x, and (2) there exists an efficient homomorphic evaluation algorithm $\Eval$ such that for any function (or "program ...
Boyle, Elette +4 more
openaire +2 more sources
Relations Between Secret Sharing and Secret Image Sharing
2019Secret sharing (SS) for (k, n) threshold generates secret data into n shadows, where any k or more shadows can reconstruct the secret while any \(k-1\) or less shadows reconstruct nothing of the secret. SS is useful for cloud computing security, block chain security and so on.
Xuehu Yan +5 more
openaire +1 more source
Probability of shares in secret sharing schemes
Information Processing Letters, 1999zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo +2 more
openaire +2 more sources
2023
Abstract The existential nature of nuclear weapons and the extreme devastation that they can cause make dependence on other nuclear powers and the exchange of nuclear secrets difficult to achieve and maintain. In this sense nuclear weapons can cause tensions and mistrust between allies.
John Baylis, Anthony Eames
openaire +1 more source
Abstract The existential nature of nuclear weapons and the extreme devastation that they can cause make dependence on other nuclear powers and the exchange of nuclear secrets difficult to achieve and maintain. In this sense nuclear weapons can cause tensions and mistrust between allies.
John Baylis, Anthony Eames
openaire +1 more source
Ideal Secret Sharing Schemes with Multiple Secrets
Journal of Cryptology, 1996zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jackson, W.A., Martin, K., O'Keefe, C.
openaire +3 more sources

