Results 91 to 100 of about 112,314 (333)
Accessing quantum secrets via local operations and classical communication
Quantum secret-sharing and quantum error-correction schemes rely on multipartite decoding protocols, yet the non-local operations involved are challenging and sometimes infeasible. Here we construct a quantum secret-sharing protocol with a reduced number
Gheorghiu, Vlad, Sanders, Barry C.
core +1 more source
Breaking Down Online and Digital Reporting Practices: A Research Map From Websites to Social Media
ABSTRACT This paper adopts a mixed research methodology, integrating bibliometric and systematic literature review (SLR) tools, to systematise the academic contributions and the different bodies of knowledge generated over the last decades on online and digital reporting practices, ranging from websites to social media.
Giuseppe Nicolò +3 more
wiley +1 more source
Secret Sharing Schemes with a large number of players from Toric Varieties [PDF]
A general theory for constructing linear secret sharing schemes over a finite field $\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\geq 1$.
Hansen, Johan P.
core
An efficient implementation of the Shamir secret sharing scheme [PDF]
Allyson Hineman, Mario Blaum
openalex +1 more source
A New Strategy to Design Reconfigurable Rivest–Shamir–Adleman (RSA) Accelerators
A reconfigurable FPGA‐based RSA accelerator is proposed using compression‐based modular multipliers combined with pseudomoduli arithmetic. The approach maps modular exponentiation to low‐cost arithmetic domains and applies a correction stage, achieving significant improvements in delay, operating frequency, and delay–area efficiency compared with ...
Augusto C. B. Vassoler +4 more
wiley +1 more source
Multiparty Quantum Secret Sharing
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a $(n,n)$-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons.
B. Schneier +4 more
core +1 more source
Hotspots, trends, and regional focus on oil or gas exploration: A bibliometric comparative study
This paper explores the research trends in global oil and gas exploration through the bibliometric analysis of 3460 articles collected from the Web of Science database on oil and gas exploration published from 2013 to 2023. The research hotspots, objects, regional distribution, methods, and evaluation methods of oil and gas exploration are analyzed and
Jihong Wang +3 more
wiley +1 more source
Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem [PDF]
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain ...
Ersoy, Oguzhan +4 more
core +1 more source
Based on acoustic emission response characteristics, it can be more accurate to identify the damage evolution process of coal under the combined dynamic and static loads, reveal the moment corresponding to coal damage, and identify the characteristics of coal failure. The research results are conducive to the further use of acoustic emission monitoring
Wei Zhang +10 more
wiley +1 more source
A New Security Measure in Secret Sharing Schemes and Secure Network Coding
Linear secret sharing schemes protect secret information from leakage and destruction by encoding secret information into multiple shares, where the secret information can be reconstructed by collecting a certain subsets of shares.
Itaru Kurihara +2 more
doaj +1 more source

