Results 51 to 60 of about 11,934 (254)
Fair Verifiable Secret Sharing Driven by Smart Contracts [PDF]
Unfair issues arise in secret sharing owing to the insufficient consideration given to participants′self-interested behaviors, such as honest participants being unable to reconstruct the shared secret while dishonest participants are able to.
ZHANG Qianhui, YUAN Lingyun, XIE Tianyu, WU Jiaying
doaj +1 more source
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley +1 more source
Almost-perfect secret sharing [PDF]
Splitting a secret s between several participants, we generate (for each value of s) shares for all participants. The goal: authorized groups of participants should be able to reconstruct the secret but forbidden ones get no information about it. In this paper we introduce several notions of non- perfect secret sharing, where some small information ...
openaire +3 more sources
Redescription of the Triassic cynodont Cistecynodon parvus and reassessment of its phylogeny
Abstract Cynodontia is an important subclade of Therapsida that first occurred in the late Permian. It includes extinct subclades which are the non‐mammaliaform cynodonts and Mammaliaformes, with the latter ultimately giving rise to crown mammals. The systematics of non‐mammaliaform cynodonts has been extensively studied and is relatively well‐resolved,
Erin S. Lund +4 more
wiley +1 more source
Color Visual Secret Sharing for QR Code with Perfect Module Reconstruction
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc.
Tao Liu, Bin Yan, Jeng-Shyang Pan
doaj +1 more source
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley +1 more source
Comparing Security Notions of Secret Sharing Schemes
Different security notions of secret sharing schemes have been proposed by different information measures. Entropies, such as Shannon entropy and min entropy, are frequently used in the setting security notions for secret sharing schemes.
Songsong Dai, Donghui Guo
doaj +1 more source
Learning with Patient Campaigners About a German Drug Scandal
The West German drug Duogynon was internationally marketed as a “hormone pregnancy test” (HPT) between the 1950s and 1980s. In the late 1960s it came under suspicion for inducing miscarriage, spina bifida, and a spectrum of birth defects similar to those caused by the sedative thalidomide.
Jesse Olszynko‐Gryn +3 more
wiley +1 more source
Essential Multi-Secret Image Sharing for Sensor Images
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj +1 more source
Controlled quantum secret sharing [PDF]
We present a new protocol in which a secret multiqubit quantum state $\ket $ is shared by $n$ players and $m$ controllers, where $\ket $ is the encoding state of a quantum secret sharing scheme. The players may be considered as field agents responsible for carrying out a task, using the secret information encrypted in $\ket $, while the controllers ...
openaire +2 more sources

