Results 21 to 30 of about 12,080 (256)
Lattice-based Threshold Secret Sharing Algorithm [PDF]
The secret sharing algorithm based on the traditional mathematical assumption is difficult to resist the attack of the quantum algorithm.Therefore,a lattice-based threshold secret sharing algorithm is proposed.The basic process of the secret sharing ...
ZHANG Hongjun,LIU Ke,MOU Zhansheng
doaj +1 more source
Simple Approach to Realizing Verifiable Secret Sharing for Secure Cloud System
In $(k, n)$ threshold secret sharing, a secret is converted into $n$ shares such that any threshold $k$ or more shares allow for the reconstruction of this secret; however, the total storage cost increases.
Keiichi Iwamura +1 more
doaj +1 more source
Boolean-Based (k, n, m) Multi-Secret Image Sharing
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property.
Chien-Chang Chen +2 more
doaj +1 more source
Secret Sharing with Binary Shares
Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbitrary length $\ell$ among any $N \leq 2^\ell$ players such that for a threshold parameter $t$, (i) the knowledge of any $t$ shares does not reveal any information about the secret and, (ii) any choice of $t+1$ shares fully reveals the secret. It is known
Lin, Fuchun +4 more
openaire +6 more sources
Sharing one secret vs. sharing many secrets
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources
(k,n) secret image sharing scheme capable of cheating detection
In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the ...
Yan-Xiao Liu +2 more
doaj +1 more source
Constructions of some secret sharing schemes based on linear codes [PDF]
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any
Ratseev, Sergey Mihailovich
doaj +1 more source
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret.
Komargodski, Ilan +2 more
openaire +3 more sources
Multiparty quantum secret sharing [PDF]
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a $(n,n)$-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons. We take advantage of this multiparty QSSCM scheme to establish a scheme of multiparty secret sharing of quantum information (SSQI),
Zhang, Zhan-jun +2 more
openaire +2 more sources
Inspired by natural silicified wood, a biomimetic mineralized chitin‐derived aerogel is constructed. It can withstand 81 000 times its own weight, and its backside temperature is 130.4°C after exposure to ∼1300°C butane flame for 600 s, exhibiting high‐strength, fire‐resistance, and super thermal‐insulation properties.
Kai Xu +11 more
wiley +1 more source

