Results 91 to 100 of about 112,314 (333)

Accessing quantum secrets via local operations and classical communication

open access: yes, 2013
Quantum secret-sharing and quantum error-correction schemes rely on multipartite decoding protocols, yet the non-local operations involved are challenging and sometimes infeasible. Here we construct a quantum secret-sharing protocol with a reduced number
Gheorghiu, Vlad, Sanders, Barry C.
core   +1 more source

Breaking Down Online and Digital Reporting Practices: A Research Map From Websites to Social Media

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This paper adopts a mixed research methodology, integrating bibliometric and systematic literature review (SLR) tools, to systematise the academic contributions and the different bodies of knowledge generated over the last decades on online and digital reporting practices, ranging from websites to social media.
Giuseppe Nicolò   +3 more
wiley   +1 more source

Secret Sharing Schemes with a large number of players from Toric Varieties [PDF]

open access: yes, 2016
A general theory for constructing linear secret sharing schemes over a finite field $\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\geq 1$.
Hansen, Johan P.
core  

A New Strategy to Design Reconfigurable Rivest–Shamir–Adleman (RSA) Accelerators

open access: yesInternational Journal of Circuit Theory and Applications, EarlyView.
A reconfigurable FPGA‐based RSA accelerator is proposed using compression‐based modular multipliers combined with pseudomoduli arithmetic. The approach maps modular exponentiation to low‐cost arithmetic domains and applies a correction stage, achieving significant improvements in delay, operating frequency, and delay–area efficiency compared with ...
Augusto C. B. Vassoler   +4 more
wiley   +1 more source

Multiparty Quantum Secret Sharing

open access: yes, 2004
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a $(n,n)$-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons.
B. Schneier   +4 more
core   +1 more source

Hotspots, trends, and regional focus on oil or gas exploration: A bibliometric comparative study

open access: yesDeep Underground Science and Engineering, EarlyView.
This paper explores the research trends in global oil and gas exploration through the bibliometric analysis of 3460 articles collected from the Web of Science database on oil and gas exploration published from 2013 to 2023. The research hotspots, objects, regional distribution, methods, and evaluation methods of oil and gas exploration are analyzed and
Jihong Wang   +3 more
wiley   +1 more source

Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem [PDF]

open access: yes, 2016
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain ...
Ersoy, Oguzhan   +4 more
core   +1 more source

Experimental study on dynamic behavior analysis of coal and its acoustic emission response characteristics under impact failure

open access: yesDeep Underground Science and Engineering, EarlyView.
Based on acoustic emission response characteristics, it can be more accurate to identify the damage evolution process of coal under the combined dynamic and static loads, reveal the moment corresponding to coal damage, and identify the characteristics of coal failure. The research results are conducive to the further use of acoustic emission monitoring
Wei Zhang   +10 more
wiley   +1 more source

A New Security Measure in Secret Sharing Schemes and Secure Network Coding

open access: yesIEEE Access
Linear secret sharing schemes protect secret information from leakage and destruction by encoding secret information into multiple shares, where the secret information can be reconstructed by collecting a certain subsets of shares.
Itaru Kurihara   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy