Results 41 to 50 of about 3,018,405 (324)

Simple Approach to Realizing Verifiable Secret Sharing for Secure Cloud System

open access: yesIEEE Access, 2022
In $(k, n)$ threshold secret sharing, a secret is converted into $n$ shares such that any threshold $k$ or more shares allow for the reconstruction of this secret; however, the total storage cost increases.
Keiichi Iwamura   +1 more
doaj   +1 more source

Boolean-Based (k, n, m) Multi-Secret Image Sharing

open access: yesAxioms, 2022
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property.
Chien-Chang Chen   +2 more
doaj   +1 more source

Ideal hierarchical secret sharing schemes [PDF]

open access: yes, 2010
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays.
A. Beimel   +30 more
core   +1 more source

Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience

open access: yesJournal of Cryptology
We present new protocols for Asynchronous Verifiable Secret Sharing for Shamir (i.e., threshold ...
V. Shoup, N. Smart
semanticscholar   +1 more source

Matroids and Quantum Secret Sharing Schemes

open access: yes, 2009
A secret sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret.
G. R. Blakley   +9 more
core   +1 more source

(k,n) secret image sharing scheme capable of cheating detection

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the ...
Yan-Xiao Liu   +2 more
doaj   +1 more source

Constructions of some secret sharing schemes based on linear codes [PDF]

open access: yesИзвестия Саратовского университета. Новая серия: Математика. Механика. Информатика
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing  scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any
Ratseev, Sergey Mihailovich
doaj   +1 more source

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

Quantum secret sharing without entanglement

open access: yes, 2002
After analysing the main quantum secret sharing protocol based on the entanglement states, we propose an idea to directly encode the qubit of quantum key distributions, and then present a quantum secret sharing scheme where only product states are ...
Bagherinezhad   +17 more
core   +1 more source

Optimal non-perfect uniform secret sharing schemes [PDF]

open access: yes, 2014
A secret sharing scheme is non-perfect if some subsets of participants that cannot recover the secret value have partial information about it. The information ratio of a secret sharing scheme is the ratio between the maximum length of the shares and the ...
A. Beimel   +19 more
core   +1 more source

Home - About - Disclaimer - Privacy