Results 51 to 60 of about 112,587 (333)

Bounds on the Information Rate of Quantum Secret Sharing Schemes

open access: yes, 2010
An important metric of the performance of a quantum secret sharing scheme is its information rate. Beyond the fact that the information rate is upper bounded by one, very little is known in terms of bounds on the information rate of quantum secret ...
Sarvepalli, Pradeep
core   +1 more source

Secret Image Sharing Schemes: A Comprehensive Survey

open access: yesIEEE Access, 2023
The safeguarding of digitized data against unwanted access and modification has become an issue of utmost importance as a direct result of the rapid development of network technology and internet applications.
Sanchita Saha   +4 more
doaj   +1 more source

How to share a quantum secret

open access: yes, 1999
We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains ...
A. Karlsson   +23 more
core   +1 more source

An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]

open access: yes, 2014
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core  

Reducing the quantum communication cost of quantum secret sharing

open access: yes, 2012
We demonstrate a new construction for perfect quantum secret sharing (QSS) schemes based on imperfect "ramp" secret sharing combined with classical encryption, in which the individual parties' shares are split into quantum and classical components ...
Fortescue, Ben, Gour, Gilad
core   +1 more source

Reusing Shares in Secret Sharing Schemes [PDF]

open access: yesThe Computer Journal, 1994
A (t, w) threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders is required in order to reconstruct the shared secret. This paper is concerned with the re-use of shares possessed by shareholders in threshold schemes.
Zheng, Yuliang   +2 more
openaire   +2 more sources

Silicified Wood‐Inspired, High‐Strength Fire‐Resistant Chitin‐Based Aerogels for Sustainable High‐Temperature Thermal Insulation

open access: yesAdvanced Functional Materials, EarlyView.
Inspired by natural silicified wood, a biomimetic mineralized chitin‐derived aerogel is constructed. It can withstand 81 000 times its own weight, and its backside temperature is 130.4°C after exposure to ∼1300°C butane flame for 600 s, exhibiting high‐strength, fire‐resistance, and super thermal‐insulation properties.
Kai Xu   +11 more
wiley   +1 more source

Advance Sharing Procedures for the Ramp Quantum Secret Sharing Schemes With the Highest Coding Rate

open access: yesIEEE Transactions on Quantum Engineering
In some quantum secret sharing schemes, it is known that some shares can be distributed to participants before a secret is given to the dealer. However, it is unclear whether some shares can be distributed before a secret is given in the ramp quantum ...
Ryutaroh Matsumoto
doaj   +1 more source

Graph Decompositions and Secret Sharing Schemes [PDF]

open access: yesJournal of Cryptology, 1993
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blundo, Carlo   +3 more
openaire   +2 more sources

Engineering Osteoimmune Responses with Functionalized Orthopedic Implants for Post‐Operative Osteosarcoma Treatment

open access: yesAdvanced Science, EarlyView.
Osteosarcoma is the most common primary bone tumor with limited treatment options and a terrible prognosis. This review provides a comprehensive summary of the recent development of osteoimmunomodulatory implants for post‐operative osteosarcoma treatment, of which the potential utility in evoking durable anti‐osteosarcoma immunity and accelerating bone
Yilong Dong   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy