Results 71 to 80 of about 112,314 (333)

On the size of shares for secret sharing schemes [PDF]

open access: yesJournal of Cryptology, 1992
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
R. M. Capocelli   +3 more
openaire   +4 more sources

Some Secret Sharing Based on Hyperplanes

open access: yesComputation
The secret sharing schemes (SSS) are widely used in secure multi-party computing and distributed computing, and the access structure is the key to constructing secret sharing schemes.
Guohui Wang, Yucheng Chen
doaj   +1 more source

ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve ...
Ruonan Shi   +4 more
doaj   +1 more source

Reducing the quantum communication cost of quantum secret sharing

open access: yes, 2012
We demonstrate a new construction for perfect quantum secret sharing (QSS) schemes based on imperfect "ramp" secret sharing combined with classical encryption, in which the individual parties' shares are split into quantum and classical components ...
Fortescue, Ben, Gour, Gilad
core   +1 more source

Dr. Hans Kohn and the political takeover of the Berlin Medical Society by the National Socialist regime in 1933

open access: yesThe Anatomical Record, EarlyView.
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley   +1 more source

Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT

open access: yesJournal of Communications Software and Systems, 2015
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8].
Anjaneyulu Endurthi   +3 more
doaj  

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

Secret-Sharing Schemes for Very Dense Graphs [PDF]

open access: yesJournal of Cryptology, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Beimel, Amos   +2 more
openaire   +2 more sources

Cold atmospheric plasma‐mediated tumor microenvironment remodeling for cancer treatment

open access: yesBMEMat, EarlyView.
Schematic presentation of CAP‐mediated TME remodeling. This review summarizes recent efforts in cold atmospheric plasma (CAP) application in cancer treatment, highlighting the anticancer potential of CAP, molecular mechanisms, and future perspectives for further improvement and clinical translation.
Israr Khan   +8 more
wiley   +1 more source

An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]

open access: yes, 2012
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core   +1 more source

Home - About - Disclaimer - Privacy