Results 61 to 70 of about 112,587 (333)
Linear Subspace Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme [PDF]
Shamir’s secret sharing scheme is one of the substantial threshold primitives, based on which many security protocols are constructed such as group authentication schemes.
A. Rezapour, Z. Ahmadian
doaj
On the information ratio of non-perfect secret sharing schemes [PDF]
The final publication is available at Springer via http://dx.doi.org/10.1007/s00453-016-0217-9A secret sharing scheme is non-perfect if some subsets of players that cannot recover the secret value have partial information about it.
Farràs Ventura, Oriol +3 more
core +2 more sources
Study of Free‐Space Optical Quantum Network: Review and Prospectives
Free from the constraints of fiber connections, free‐space quantum network enables longer and more flexible quantum network connections. This review summarizes and comparatively analyzes free‐space quantum network experiments based on ground stations, satellites, and mobile platforms.
Hua‐Ying Liu, Zhenda Xie, Shining Zhu
wiley +1 more source
Renewable Multi-secret Sharing of Self-selecting Sub-secret [PDF]
The existing public verifiable multi-secret sharing schemes without trusted centers can not make sub-secrets self-selected and periodical renewable simultaneously.In order to solve the problem,a public verifiable and renewable multi-secret sharing scheme
GU Ting,DU Weizhang
doaj +1 more source
A Resilient Quantum Secret Sharing Scheme [PDF]
A resilient secret sharing scheme is supposed to generate the secret correctly even after some shares are damaged. In this paper, we show how quantum error correcting codes can be exploited to design a resilient quantum secret sharing scheme, where a quantum state is shared among more than one parties.
Maitra, Arpita, Paul, Goutam
openaire +3 more sources
The development of polarization‐sensitive ultraviolet photodetectors is limited by poor heterojunction quality and low polarization sensitivity. This study integrates synthesized CsAg2I3 single crystals with intrinsic non‐centrosymmetry into van der Waals heterojunction devices, demonstrating pronounced pyro‐phototronic effect.
Yalin Zhai +9 more
wiley +1 more source
Secure Secret Sharing With Adaptive Bandwidth in Distributed Cloud Storage Systems
The development of cloud storage technology has brought us great convenience that we can store data in remote servers and access it on any connected device.
Hailiang Xiong +4 more
doaj +1 more source
Fourier-based Function Secret Sharing with General Access Structure
Function secret sharing (FSS) scheme is a mechanism that calculates a function f(x) for x in {0,1}^n which is shared among p parties, by using distributed functions f_i:{0,1}^n -> G, where G is an Abelian group, while the function f:{0,1}^n -> G is kept ...
A Beimel +5 more
core +1 more source
ABSTRACT Vending is an important sector in the daily lives of many people, and coffee is the most frequently consumed product in the European market. Like many other sectors, vending is responding to the challenge of sustainable development by taking various actions, such as offering increasingly ecologically sound coffee while maintaining/improving ...
Alberto Bertossi +2 more
wiley +1 more source
A Multisecret-Sharing Scheme Based on LCD Codes
Secret sharing is one of the most important cryptographic protocols. Secret sharing schemes (SSS) have been created to that end. This protocol requires a dealer and several participants.
Adel Alahmadi +5 more
doaj +1 more source

