Results 41 to 50 of about 375,511 (221)

Secret Sharing of a Quantum State [PDF]

open access: yesPhysical Review Letters, 2016
13 pages, 9 ...
Chang Liu   +9 more
openaire   +5 more sources

Matroids and Quantum Secret Sharing Schemes

open access: yes, 2009
A secret sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret.
G. R. Blakley   +9 more
core   +1 more source

Secret sharing with reusable polynomials [PDF]

open access: yes, 1997
We present a threshold secret sharing scheme based on polynomial interpolation and the Diffie-Hellman problem. In this scheme shares can be used for the reconstruction of multiple secrets, shareholders can dynamically join or leave without distributing new shares to the existing shareholders, and shares can be individually verified during both share ...
Chen, LIqun   +3 more
openaire   +11 more sources

Is quantum secret sharing different to the sharing of a quantum secret? [PDF]

open access: yesSPIE Proceedings, 2004
We present an experimental scheme to perform continuous variable (2,3) threshold quantum secret sharing on the quadratures amplitudes of bright light beams. It requires a pair of entangled light beams and an electro-optic feedforward loop for the reconstruction of the secret.
Ping Koy Lam   +6 more
openaire   +2 more sources

On-line secret sharing [PDF]

open access: yesDesigns, Codes and Cryptography, 2011
In an on-line secret sharing scheme the dealer assigns shares in the order the participants show up, knowing only those qualified subsets whose all members she has seen. We assume that the overall access structure is known and only the order of the participants is unknown.
Csirmaz, László, Tardos, Gábor
openaire   +4 more sources

(k,n) secret image sharing scheme capable of cheating detection

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the ...
Yan-Xiao Liu   +2 more
doaj   +1 more source

Secret Sharing With Public Reconstruction [PDF]

open access: yesIEEE Transactions on Information Theory, 1995
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Amos Beimel, Benny Chor
openaire   +3 more sources

Constructions of some secret sharing schemes based on linear codes [PDF]

open access: yesИзвестия Саратовского университета. Новая серия: Математика. Механика. Информатика
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing  scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any
Ratseev, Sergey Mihailovich
doaj   +1 more source

Sharing one secret vs. sharing many secrets

open access: yesTheoretical Computer Science, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +3 more sources

Quantum secret sharing without entanglement

open access: yes, 2002
After analysing the main quantum secret sharing protocol based on the entanglement states, we propose an idea to directly encode the qubit of quantum key distributions, and then present a quantum secret sharing scheme where only product states are ...
Bagherinezhad   +17 more
core   +1 more source

Home - About - Disclaimer - Privacy