Results 41 to 50 of about 162,835 (326)
Graph Decompositions and Secret Sharing Schemes [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blundo, Carlo +3 more
openaire +2 more sources
Osteosarcoma is the most common primary bone tumor with limited treatment options and a terrible prognosis. This review provides a comprehensive summary of the recent development of osteoimmunomodulatory implants for post‐operative osteosarcoma treatment, of which the potential utility in evoking durable anti‐osteosarcoma immunity and accelerating bone
Yilong Dong +6 more
wiley +1 more source
Fair Verifiable Secret Sharing Driven by Smart Contracts [PDF]
Unfair issues arise in secret sharing owing to the insufficient consideration given to participants′self-interested behaviors, such as honest participants being unable to reconstruct the shared secret while dishonest participants are able to.
ZHANG Qianhui, YUAN Lingyun, XIE Tianyu, WU Jiaying
doaj +1 more source
Boolean-Based (k, n, m) Multi-Secret Image Sharing
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property.
Chien-Chang Chen +2 more
doaj +1 more source
Bounds on the Information Rate of Quantum Secret Sharing Schemes
An important metric of the performance of a quantum secret sharing scheme is its information rate. Beyond the fact that the information rate is upper bounded by one, very little is known in terms of bounds on the information rate of quantum secret ...
Sarvepalli, Pradeep
core +1 more source
Study of Free‐Space Optical Quantum Network: Review and Prospectives
Free from the constraints of fiber connections, free‐space quantum network enables longer and more flexible quantum network connections. This review summarizes and comparatively analyzes free‐space quantum network experiments based on ground stations, satellites, and mobile platforms.
Hua‐Ying Liu, Zhenda Xie, Shining Zhu
wiley +1 more source
Two new color (n, n)-secret sharing schemes
Two methods of(n,n)-secret sharing scheme for color images were presented.Decryption was processed by XOR operation.The reconstruction complexity of the proposed scheme is equivalent to the visual secret sharing scheme,furthermore the quality of the ...
YI Feng +3 more
doaj +2 more sources
A Resilient Quantum Secret Sharing Scheme [PDF]
A resilient secret sharing scheme is supposed to generate the secret correctly even after some shares are damaged. In this paper, we show how quantum error correcting codes can be exploited to design a resilient quantum secret sharing scheme, where a quantum state is shared among more than one parties.
Maitra, Arpita, Paul, Goutam
openaire +3 more sources
The development of polarization‐sensitive ultraviolet photodetectors is limited by poor heterojunction quality and low polarization sensitivity. This study integrates synthesized CsAg2I3 single crystals with intrinsic non‐centrosymmetry into van der Waals heterojunction devices, demonstrating pronounced pyro‐phototronic effect.
Yalin Zhai +9 more
wiley +1 more source
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
Secret sharing is an important aspect of key management in wireless ad hoc and sensor networks. In this paper, we define a new secure model of secret sharing, use the Lagrange interpolation and the bilinear cyclic groups to construct an efficient ...
Yuanju Gan +4 more
doaj +1 more source

