Results 11 to 20 of about 112,587 (333)
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation. [PDF]
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure.
Lifeng Yuan +4 more
doaj +2 more sources
Ideal hierarchical secret sharing schemes [PDF]
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays.
A. Beimel +30 more
core +8 more sources
Nonlinear Secret Image Sharing Scheme [PDF]
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj +3 more sources
Generalized Semi-Quantum Secret Sharing Schemes [PDF]
We investigate quantum secret sharing schemes constructed from $[[n,k,\delta]]_D$ non-binary stabilizer quantum error correcting codes with carrier qudits of prime dimension $D$.
Gheorghiu, Vlad
core +2 more sources
On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme [PDF]
Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS) schemes decode the secret without computation, but each share is m times as big as the original ...
Wang Daoshun, Yi Feng
doaj +3 more sources
Information Flow in Secret Sharing Protocols [PDF]
The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret ...
Elham Kashefi +3 more
doaj +5 more sources
Matroids and Quantum Secret Sharing Schemes [PDF]
A secret sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret.
G. R. Blakley +9 more
core +2 more sources
Efficient Multi-Party Quantum Secret Sharing Schemes [PDF]
In this work, we generalize the quantum secret sharing scheme of Hillary, Bu\v{z}ek and Berthiaume[Phys. Rev. A59, 1829(1999)] into arbitrary multi-parties. Explicit expressions for the shared secret bit is given.
B. Schneier +8 more
core +2 more sources
Advance Sharing of Quantum Shares for Classical Secrets
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret sharing schemes. Classical secret sharing has been known to be able to distribute some shares before a given secret. On the other hand,
Rina Miyajima, Ryutaroh Matsumoto
doaj +1 more source
IoT-Applicable Generalized Frameproof Combinatorial Designs
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share ...
Bimal Kumar Roy, Anandarup Roy
doaj +1 more source

