Results 41 to 50 of about 112,314 (333)
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset ...
A. Beimel +20 more
core +4 more sources
Secret Image Sharing Schemes: A Comprehensive Survey
The safeguarding of digitized data against unwanted access and modification has become an issue of utmost importance as a direct result of the rapid development of network technology and internet applications.
Sanchita Saha +4 more
doaj +1 more source
We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains ...
A. Karlsson +23 more
core +1 more source
Osteosarcoma is the most common primary bone tumor with limited treatment options and a terrible prognosis. This review provides a comprehensive summary of the recent development of osteoimmunomodulatory implants for post‐operative osteosarcoma treatment, of which the potential utility in evoking durable anti‐osteosarcoma immunity and accelerating bone
Yilong Dong +6 more
wiley +1 more source
Reusing Shares in Secret Sharing Schemes [PDF]
A (t, w) threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders is required in order to reconstruct the shared secret. This paper is concerned with the re-use of shares possessed by shareholders in threshold schemes.
Zheng, Yuliang +2 more
openaire +2 more sources
Advance Sharing Procedures for the Ramp Quantum Secret Sharing Schemes With the Highest Coding Rate
In some quantum secret sharing schemes, it is known that some shares can be distributed to participants before a secret is given to the dealer. However, it is unclear whether some shares can be distributed before a secret is given in the ramp quantum ...
Ryutaroh Matsumoto
doaj +1 more source
On the optimization of bipartite secret sharing schemes [PDF]
Optimizing the ratio between the maximum length of the shares and the length of the secret value in secret sharing schemes for general access structures is an extremely difficult and long-standing open problem.
Farràs Ventura, Oriol +3 more
core +2 more sources
ITGB1 Regulates Triple‐Negative Breast Cancer Development by Modulating the Tumor Microenvironment
ABSTRACT Tumorigenesis and metastasis are frequently attributed to the intricate interplay between cancer cells and the tumor microenvironment (TME). Comprehending the mechanisms and key regulators of cancer‐immune crosstalk in the TME is imperative for developing efficacious immunotherapy.
Nuozi Song +12 more
wiley +1 more source
Graph Decompositions and Secret Sharing Schemes [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blundo, Carlo +3 more
openaire +2 more sources
Linear Subspace Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme [PDF]
Shamir’s secret sharing scheme is one of the substantial threshold primitives, based on which many security protocols are constructed such as group authentication schemes.
A. Rezapour, Z. Ahmadian
doaj

