Results 121 to 130 of about 112,587 (333)
Optimal Improvement Ratios of Multi-Secret Sharing Schemes Can Be Achieved
Secret sharing schemes (SSS) deal with activities relative to the secure distribution of a secret among a group of participants who then securely reconstruct the secret by collecting the shares which are held by individuals in qualified sets.
Juan Justie Su-Tzu +2 more
doaj +1 more source
A New Visual Multi-Secrets Sharing Scheme by Random Grids
In (2, 2)-visual secret sharing (VSS) schemes, a common type of (k, n)-threshold VSS schemes, secret information can be decoded directly through only two shares by using a human vision system.
Joy Jo-Yi Chang +2 more
doaj +1 more source
Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth's second tower
Asymptotically good sequences of ramp secret sharing schemes were given in [Asymptotically good ramp secret sharing schemes, arXiv:1502.05507] by using one-point algebraic geometric codes defined from asymptotically good towers of function fields.
Geil, Olav +3 more
core
Cement infill shares compressive and shear stresses during loading, while interfacial friction hinders crack propagation and reduces stress concentration, improving the rock's load‐bearing capacity. Failure modes vary with crack inclination. Unfilled specimens show four modes.
Shihao Yuan +4 more
wiley +1 more source
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the additional property that the secret can be recovered, with probability at least , from the set of all shares even if up to t players provide incorrect ...
Jhanwar Mahabir P. +1 more
doaj +1 more source
The evolution of the temperature field and frozen wall under different fracture conditions was examined by an artificial ground freezing‐based thermal‐hydraulic coupled model. It was observed that fracture inclination affects the interaction extent of freezing pipes and fracture, while phase transition extent is the dominant factor for heat transfer in
Chenyi Zhang +9 more
wiley +1 more source
B1 is bord width 1, B2 is bord width 2, L is the pillar length, W is the pillar width, red color and letter A represent the pillars, and white color and number 1 represent excavated areas. Pstress is the average pillar stress; σv is the vertical component of the virgin stress, MPa; and e is the areal extraction ratio. e = B o B o + B P ${\rm{e}}=\frac{{
Tawanda Zvarivadza +4 more
wiley +1 more source
Interactive Verifiable Secret Sharing Scheme
Commitment schemes, secret sharing schemes, interactive zero-knowledge proofs which underlie the offered interactive secrete sharing schemes are considered. Such schemes are one of the main computing primitives in the theory of secure computations.
O. V. Kazarin
doaj
This study demonstrates the feasibility of an underground closed‐loop thermal storage facility at a post‐mining site, intended for seasonal heat energy storage. Its principal design shows water flow directions in winter and summer (1, 2), heat pumps (3), an upper water reservoir (4), and connecting pipes (5).
Dmytro Rudakov, Oleksandr Inkin
wiley +1 more source
This study investigated the spatial patterns and development mechanisms of urban underground space (UUS) in Shanghai using underground points of interest data. It revealed distinct development mechanisms between the main city and suburbs, highlighting the need for differentiated UUS planning and policies to optimize underground space resources ...
Chenxiao Ma +3 more
wiley +1 more source

