Results 61 to 70 of about 112,587 (333)

Linear Subspace Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme [PDF]

open access: yesIranian Journal of Electrical and Electronic Engineering, 2023
Shamir’s secret sharing scheme is one of the substantial threshold primitives, based on which many security protocols are constructed such as group authentication schemes.
A. Rezapour, Z. Ahmadian
doaj  

On the information ratio of non-perfect secret sharing schemes [PDF]

open access: yes, 2017
The final publication is available at Springer via http://dx.doi.org/10.1007/s00453-016-0217-9A secret sharing scheme is non-perfect if some subsets of players that cannot recover the secret value have partial information about it.
Farràs Ventura, Oriol   +3 more
core   +2 more sources

Study of Free‐Space Optical Quantum Network: Review and Prospectives

open access: yesAdvanced Science, EarlyView.
Free from the constraints of fiber connections, free‐space quantum network enables longer and more flexible quantum network connections. This review summarizes and comparatively analyzes free‐space quantum network experiments based on ground stations, satellites, and mobile platforms.
Hua‐Ying Liu, Zhenda Xie, Shining Zhu
wiley   +1 more source

Renewable Multi-secret Sharing of Self-selecting Sub-secret [PDF]

open access: yesJisuanji gongcheng, 2016
The existing public verifiable multi-secret sharing schemes without trusted centers can not make sub-secrets self-selected and periodical renewable simultaneously.In order to solve the problem,a public verifiable and renewable multi-secret sharing scheme
GU Ting,DU Weizhang
doaj   +1 more source

A Resilient Quantum Secret Sharing Scheme [PDF]

open access: yesInternational Journal of Theoretical Physics, 2014
A resilient secret sharing scheme is supposed to generate the secret correctly even after some shares are damaged. In this paper, we show how quantum error correcting codes can be exploited to design a resilient quantum secret sharing scheme, where a quantum state is shared among more than one parties.
Maitra, Arpita, Paul, Goutam
openaire   +3 more sources

Synergistic Pyro‐Phototronics and Structural Anisotropy in CsAg2I3/GaN Heterostructures for High‐Performance Polarization‐Sensitive UV Photodetectors

open access: yesAdvanced Science, EarlyView.
The development of polarization‐sensitive ultraviolet photodetectors is limited by poor heterojunction quality and low polarization sensitivity. This study integrates synthesized CsAg2I3 single crystals with intrinsic non‐centrosymmetry into van der Waals heterojunction devices, demonstrating pronounced pyro‐phototronic effect.
Yalin Zhai   +9 more
wiley   +1 more source

Secure Secret Sharing With Adaptive Bandwidth in Distributed Cloud Storage Systems

open access: yesIEEE Access, 2020
The development of cloud storage technology has brought us great convenience that we can store data in remote servers and access it on any connected device.
Hailiang Xiong   +4 more
doaj   +1 more source

Fourier-based Function Secret Sharing with General Access Structure

open access: yes, 2017
Function secret sharing (FSS) scheme is a mechanism that calculates a function f(x) for x in {0,1}^n which is shared among p parties, by using distributed functions f_i:{0,1}^n -> G, where G is an Abelian group, while the function f:{0,1}^n -> G is kept ...
A Beimel   +5 more
core   +1 more source

Circularity, Sustainability, and the Quality of Coffee Sold via Vending Machines: What Do Italian Consumers Prefer?

open access: yesAgribusiness, EarlyView.
ABSTRACT Vending is an important sector in the daily lives of many people, and coffee is the most frequently consumed product in the European market. Like many other sectors, vending is responding to the challenge of sustainable development by taking various actions, such as offering increasingly ecologically sound coffee while maintaining/improving ...
Alberto Bertossi   +2 more
wiley   +1 more source

A Multisecret-Sharing Scheme Based on LCD Codes

open access: yesMathematics, 2020
Secret sharing is one of the most important cryptographic protocols. Secret sharing schemes (SSS) have been created to that end. This protocol requires a dealer and several participants.
Adel Alahmadi   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy