Results 41 to 50 of about 162,835 (326)

Graph Decompositions and Secret Sharing Schemes [PDF]

open access: yesJournal of Cryptology, 1993
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blundo, Carlo   +3 more
openaire   +2 more sources

Engineering Osteoimmune Responses with Functionalized Orthopedic Implants for Post‐Operative Osteosarcoma Treatment

open access: yesAdvanced Science, EarlyView.
Osteosarcoma is the most common primary bone tumor with limited treatment options and a terrible prognosis. This review provides a comprehensive summary of the recent development of osteoimmunomodulatory implants for post‐operative osteosarcoma treatment, of which the potential utility in evoking durable anti‐osteosarcoma immunity and accelerating bone
Yilong Dong   +6 more
wiley   +1 more source

Fair Verifiable Secret Sharing Driven by Smart Contracts [PDF]

open access: yesJisuanji gongcheng
Unfair issues arise in secret sharing owing to the insufficient consideration given to participants′self-interested behaviors, such as honest participants being unable to reconstruct the shared secret while dishonest participants are able to.
ZHANG Qianhui, YUAN Lingyun, XIE Tianyu, WU Jiaying
doaj   +1 more source

Boolean-Based (k, n, m) Multi-Secret Image Sharing

open access: yesAxioms, 2022
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property.
Chien-Chang Chen   +2 more
doaj   +1 more source

Bounds on the Information Rate of Quantum Secret Sharing Schemes

open access: yes, 2010
An important metric of the performance of a quantum secret sharing scheme is its information rate. Beyond the fact that the information rate is upper bounded by one, very little is known in terms of bounds on the information rate of quantum secret ...
Sarvepalli, Pradeep
core   +1 more source

Study of Free‐Space Optical Quantum Network: Review and Prospectives

open access: yesAdvanced Science, EarlyView.
Free from the constraints of fiber connections, free‐space quantum network enables longer and more flexible quantum network connections. This review summarizes and comparatively analyzes free‐space quantum network experiments based on ground stations, satellites, and mobile platforms.
Hua‐Ying Liu, Zhenda Xie, Shining Zhu
wiley   +1 more source

Two new color (n, n)-secret sharing schemes

open access: yesTongxin xuebao, 2007
Two methods of(n,n)-secret sharing scheme for color images were presented.Decryption was processed by XOR operation.The reconstruction complexity of the proposed scheme is equivalent to the visual secret sharing scheme,furthermore the quality of the ...
YI Feng   +3 more
doaj   +2 more sources

A Resilient Quantum Secret Sharing Scheme [PDF]

open access: yesInternational Journal of Theoretical Physics, 2014
A resilient secret sharing scheme is supposed to generate the secret correctly even after some shares are damaged. In this paper, we show how quantum error correcting codes can be exploited to design a resilient quantum secret sharing scheme, where a quantum state is shared among more than one parties.
Maitra, Arpita, Paul, Goutam
openaire   +3 more sources

Synergistic Pyro‐Phototronics and Structural Anisotropy in CsAg2I3/GaN Heterostructures for High‐Performance Polarization‐Sensitive UV Photodetectors

open access: yesAdvanced Science, EarlyView.
The development of polarization‐sensitive ultraviolet photodetectors is limited by poor heterojunction quality and low polarization sensitivity. This study integrates synthesized CsAg2I3 single crystals with intrinsic non‐centrosymmetry into van der Waals heterojunction devices, demonstrating pronounced pyro‐phototronic effect.
Yalin Zhai   +9 more
wiley   +1 more source

Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Secret sharing is an important aspect of key management in wireless ad hoc and sensor networks. In this paper, we define a new secure model of secret sharing, use the Lagrange interpolation and the bilinear cyclic groups to construct an efficient ...
Yuanju Gan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy