Results 281 to 290 of about 3,018,405 (324)
Some of the next articles are maybe not open access.
Modern Cryptography with Proof Techniques and Applications, 2021
Trusting a single entity with an important piece of information is something that carries a large amount of potential risks and often requires a large amount of trust placed in this entity.
S. Hwang, Intae Kim, W. Lee
semanticscholar +1 more source
Trusting a single entity with an important piece of information is something that carries a large amount of potential risks and often requires a large amount of trust placed in this entity.
S. Hwang, Intae Kim, W. Lee
semanticscholar +1 more source
GAN-Based Key Secret-Sharing Scheme in Blockchain
IEEE Transactions on Cybernetics, 2020In this article, we propose a key secret-sharing technology based on generative adversarial networks (GANs) to address three major problems in the blockchain: 1) low security; 2) hard recovery of lost keys; and 3) low communication efficiency.
Wenbo Zheng, Kunfeng Wang, Fei-Yue Wang
semanticscholar +1 more source
IEEE Transactions on Information Forensics and Security, 2019
Reversible data hiding in encrypted images (RDHEI) has been introduced for preserving image privacy and data embedding. RDHEI usually involves three parties, namely, the image provider, data hider, and receiver.
Yu-Chi Chen +3 more
semanticscholar +1 more source
Reversible data hiding in encrypted images (RDHEI) has been introduced for preserving image privacy and data embedding. RDHEI usually involves three parties, namely, the image provider, data hider, and receiver.
Yu-Chi Chen +3 more
semanticscholar +1 more source
Experimental Demonstration of 11‐Dimensional 10‐Party Quantum Secret Sharing
Laser & Photonics reviews, 2020Quantum secret sharing is the art of securely sharing information between more than two people in such a way that its reconstruction requires the collaboration of a certain number of parties.
J. Pinnell +4 more
semanticscholar +1 more source
Lightweight, Maliciously Secure Verifiable Function Secret Sharing
International Conference on the Theory and Application of Cryptographic Techniques, 2022Leo de Castro, Anitgoni Polychroniadou
semanticscholar +1 more source
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
IACR Cryptology ePrint Archive, 2021Craig Gentry +2 more
semanticscholar +1 more source
Authenticable Quantum Scheme for Secret Sharing Based on Local Distinguishability
International Journal of Theoretical Physics, 2021Xing-lan Zhang, Li-Yu Zuo, Sheng-lin Yin
semanticscholar +1 more source
Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head
IACR Cryptology ePrint Archive, 2022Thibauld Feneuil, Matthieu Rivain
semanticscholar +1 more source
Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing
IACR Cryptology ePrint Archive, 2022Vipul Goyal +2 more
semanticscholar +1 more source
A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
Quantum Information Processing, 2022Fulin Li +4 more
semanticscholar +1 more source

