Results 61 to 70 of about 162,835 (326)
Correction to: A lossless secret image sharing scheme using a larger finite field [PDF]
Weitong Hu +4 more
openalex +1 more source
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley +1 more source
Linear Subspace Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme [PDF]
Shamir’s secret sharing scheme is one of the substantial threshold primitives, based on which many security protocols are constructed such as group authentication schemes.
A. Rezapour, Z. Ahmadian
doaj
Randomness Recoverable Secret Sharing Schemes
The present article deals with the case study of particular models of sharing secrets as well as modal schemes treated from the informational-theoretical and computational perspectives. The main novelty brought by the authors refers to the demonstration of the conclusion that access structures can be treated with RR-SSS.
Hajiabadi, Mohammad +2 more
openaire +4 more sources
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley +1 more source
Anonymous secret sharing schemes
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blundo, C., Stinson, D.R.
openaire +2 more sources
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source
Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images
In today's era of developed network, it is particularly important to ensure the security of information. Secret image sharing is a kind of secret information protection technology with loss tolerance by sharing a secret image to a number of shadow images.
Qinghong Gong +3 more
doaj +1 more source
Multipartite secret sharing schemes
This thesis is dedicated to the study of secret sharing schemes, which are cryptographic methods to share information in a secure way. The topics that are considered in the thesis are two of the main open problems in secret sharing: the characterization of the ideal access structures and the optimization of the length of the shares for general access ...
openaire +4 more sources
Multi-Secret Sharing Schemes [PDF]
A multi-secret sharing scheme is a protocol to share m arbitrarily related secrets s1,..., sm among a set of participants P. In this paper we put forward a general theory of multi-secret sharing schemes by using an information theoretical framework. We prove lower bounds on the size of information held by each participant for various access structures.
Carlo Blundo +4 more
openaire +1 more source

