Results 31 to 40 of about 112,314 (333)

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme

open access: yesIEEE Access, 2020
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang   +3 more
doaj   +1 more source

Visual secret sharing and related Works -A Review [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj   +1 more source

Security of a kind of quantum secret sharing with entangled states

open access: yesScientific Reports, 2017
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others’ cooperation.
Tian-Yin Wang   +4 more
doaj   +1 more source

Triple Matrix Confinement‐Induced Ultrabright Afterglow From Carbon Dots With Multivariate Responsive Afterglow Colors for Advanced Dynamic Information Encryption

open access: yesAngewandte Chemie, EarlyView.
A novel carbon dots material (BUL‐CDs) with an initial afterglow brightness (406 cd m−2) far exceeding that of other afterglow luminescent materials was developed. Furthermore, the BUL‐CDs exhibited time‐dependent afterglow colors, excitation‐dependent afterglow colors, and thermochromic afterglow in response to triplet variables.
Yupeng Liu   +13 more
wiley   +2 more sources

An Implementation of Image Secret Sharing Scheme Based on Matrix Operations

open access: yesMathematics, 2022
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj   +1 more source

Non-Threshold Quantum Secret Sharing Schemes in the Graph State Formalism

open access: yes, 2012
In a recent work, Markham and Sanders have proposed a framework to study quantum secret sharing (QSS) schemes using graph states. This framework unified three classes of QSS protocols, namely, sharing classical secrets over private and public channels ...
K. Rietjens   +2 more
core   +1 more source

Fourier-based Function Secret Sharing with General Access Structure

open access: yes, 2017
Function secret sharing (FSS) scheme is a mechanism that calculates a function f(x) for x in {0,1}^n which is shared among p parties, by using distributed functions f_i:{0,1}^n -> G, where G is an Abelian group, while the function f:{0,1}^n -> G is kept ...
A Beimel   +5 more
core   +1 more source

On asymptotically good ramp secret sharing schemes [PDF]

open access: yes, 2015
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by Cramer et al. in terms of sequences of pairs of nested algebraic geometric codes. In those works the focus is on full privacy and full reconstruction. In
Geil, Olav   +4 more
core   +3 more sources

Verifiable multi-secret sharing schemes applicable to arbitrary access structures

open access: yesTongxin xuebao, 2007
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj   +2 more sources

Bounds on the Information Rate of Quantum Secret Sharing Schemes

open access: yes, 2010
An important metric of the performance of a quantum secret sharing scheme is its information rate. Beyond the fact that the information rate is upper bounded by one, very little is known in terms of bounds on the information rate of quantum secret ...
Sarvepalli, Pradeep
core   +1 more source

Home - About - Disclaimer - Privacy