Results 11 to 20 of about 112,314 (333)

Ideal hierarchical secret sharing schemes [PDF]

open access: yesIEEE Transactions on Information Theory, 2010
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays.
A. Beimel   +30 more
core   +8 more sources

Generalized Semi-Quantum Secret Sharing Schemes [PDF]

open access: yesPhysical Review A, 2012
We investigate quantum secret sharing schemes constructed from $[[n,k,\delta]]_D$ non-binary stabilizer quantum error correcting codes with carrier qudits of prime dimension $D$.
Gheorghiu, Vlad
core   +2 more sources

Information Flow in Secret Sharing Protocols [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2009
The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret ...
Elham Kashefi   +3 more
doaj   +5 more sources

Matroids and Quantum Secret Sharing Schemes [PDF]

open access: yesPhysical Review A, 2009
A secret sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret.
G. R. Blakley   +9 more
core   +2 more sources

Nonlinear Secret Image Sharing Scheme [PDF]

open access: yesThe Scientific World Journal, 2014
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj   +3 more sources

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme [PDF]

open access: yesEURASIP Journal on Advances in Signal Processing, 2010
Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS) schemes decode the secret without computation, but each share is m times as big as the original ...
Wang Daoshun, Yi Feng
doaj   +3 more sources

Message Randomization and Strong Security in Quantum Stabilizer-Based Secret Sharing for Classical Secrets [PDF]

open access: yes, 2020
We improve the flexibility in designing access structures of quantum stabilizer-based secret sharing schemes for classical secrets, by introducing message randomization in their encoding procedures.
Matsumoto, Ryutaroh
core   +2 more sources

Universally ideal secret-sharing schemes [PDF]

open access: yesIEEE Transactions on Information Theory, 1994
Summary: Given a set of parties \(\{1, \dots, n\}\), an access structure is a monotone collection of subsets of the parties. For a certain domain of secrets, a secret-sharing scheme for an access structure is a method for a dealer to distribute shares to the parties.
Beimel, Amos, Chor, Benny
openaire   +3 more sources

Ideal Multipartite Secret Sharing Schemes [PDF]

open access: yesJournal of Cryptology, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Farràs, Oriol   +2 more
openaire   +3 more sources

Fully dynamic secret sharing schemes [PDF]

open access: yesTheoretical Computer Science, 1994
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blundo, Carlo   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy