Results 41 to 50 of about 112,314 (333)

Secret-Sharing for NP [PDF]

open access: yes, 2014
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset ...
A. Beimel   +20 more
core   +4 more sources

Secret Image Sharing Schemes: A Comprehensive Survey

open access: yesIEEE Access, 2023
The safeguarding of digitized data against unwanted access and modification has become an issue of utmost importance as a direct result of the rapid development of network technology and internet applications.
Sanchita Saha   +4 more
doaj   +1 more source

How to share a quantum secret

open access: yes, 1999
We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains ...
A. Karlsson   +23 more
core   +1 more source

Engineering Osteoimmune Responses with Functionalized Orthopedic Implants for Post‐Operative Osteosarcoma Treatment

open access: yesAdvanced Science, EarlyView.
Osteosarcoma is the most common primary bone tumor with limited treatment options and a terrible prognosis. This review provides a comprehensive summary of the recent development of osteoimmunomodulatory implants for post‐operative osteosarcoma treatment, of which the potential utility in evoking durable anti‐osteosarcoma immunity and accelerating bone
Yilong Dong   +6 more
wiley   +1 more source

Reusing Shares in Secret Sharing Schemes [PDF]

open access: yesThe Computer Journal, 1994
A (t, w) threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders is required in order to reconstruct the shared secret. This paper is concerned with the re-use of shares possessed by shareholders in threshold schemes.
Zheng, Yuliang   +2 more
openaire   +2 more sources

Advance Sharing Procedures for the Ramp Quantum Secret Sharing Schemes With the Highest Coding Rate

open access: yesIEEE Transactions on Quantum Engineering
In some quantum secret sharing schemes, it is known that some shares can be distributed to participants before a secret is given to the dealer. However, it is unclear whether some shares can be distributed before a secret is given in the ramp quantum ...
Ryutaroh Matsumoto
doaj   +1 more source

On the optimization of bipartite secret sharing schemes [PDF]

open access: yes, 2012
Optimizing the ratio between the maximum length of the shares and the length of the secret value in secret sharing schemes for general access structures is an extremely difficult and long-standing open problem.
Farràs Ventura, Oriol   +3 more
core   +2 more sources

ITGB1 Regulates Triple‐Negative Breast Cancer Development by Modulating the Tumor Microenvironment

open access: yesAdvanced Science, EarlyView.
ABSTRACT Tumorigenesis and metastasis are frequently attributed to the intricate interplay between cancer cells and the tumor microenvironment (TME). Comprehending the mechanisms and key regulators of cancer‐immune crosstalk in the TME is imperative for developing efficacious immunotherapy.
Nuozi Song   +12 more
wiley   +1 more source

Graph Decompositions and Secret Sharing Schemes [PDF]

open access: yesJournal of Cryptology, 1993
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blundo, Carlo   +3 more
openaire   +2 more sources

Linear Subspace Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme [PDF]

open access: yesIranian Journal of Electrical and Electronic Engineering, 2023
Shamir’s secret sharing scheme is one of the substantial threshold primitives, based on which many security protocols are constructed such as group authentication schemes.
A. Rezapour, Z. Ahmadian
doaj  

Home - About - Disclaimer - Privacy