Results 31 to 40 of about 112,314 (333)
Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang +3 more
doaj +1 more source
Visual secret sharing and related Works -A Review [PDF]
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj +1 more source
Security of a kind of quantum secret sharing with entangled states
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others’ cooperation.
Tian-Yin Wang +4 more
doaj +1 more source
A novel carbon dots material (BUL‐CDs) with an initial afterglow brightness (406 cd m−2) far exceeding that of other afterglow luminescent materials was developed. Furthermore, the BUL‐CDs exhibited time‐dependent afterglow colors, excitation‐dependent afterglow colors, and thermochromic afterglow in response to triplet variables.
Yupeng Liu +13 more
wiley +2 more sources
An Implementation of Image Secret Sharing Scheme Based on Matrix Operations
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj +1 more source
Non-Threshold Quantum Secret Sharing Schemes in the Graph State Formalism
In a recent work, Markham and Sanders have proposed a framework to study quantum secret sharing (QSS) schemes using graph states. This framework unified three classes of QSS protocols, namely, sharing classical secrets over private and public channels ...
K. Rietjens +2 more
core +1 more source
Fourier-based Function Secret Sharing with General Access Structure
Function secret sharing (FSS) scheme is a mechanism that calculates a function f(x) for x in {0,1}^n which is shared among p parties, by using distributed functions f_i:{0,1}^n -> G, where G is an Abelian group, while the function f:{0,1}^n -> G is kept ...
A Beimel +5 more
core +1 more source
On asymptotically good ramp secret sharing schemes [PDF]
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by Cramer et al. in terms of sequences of pairs of nested algebraic geometric codes. In those works the focus is on full privacy and full reconstruction. In
Geil, Olav +4 more
core +3 more sources
Verifiable multi-secret sharing schemes applicable to arbitrary access structures
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj +2 more sources
Bounds on the Information Rate of Quantum Secret Sharing Schemes
An important metric of the performance of a quantum secret sharing scheme is its information rate. Beyond the fact that the information rate is upper bounded by one, very little is known in terms of bounds on the information rate of quantum secret ...
Sarvepalli, Pradeep
core +1 more source

