Results 81 to 90 of about 112,587 (333)

Some Multisecret-Sharing Schemes over Finite Fields

open access: yesMathematics, 2020
A secret sharing scheme is a method of assigning shares for a secret to some participants such that only some distinguished subsets of these subsets can recover the secret while other subsets cannot.
Selda Çalkavur, Patrick Solé
doaj   +1 more source

Multipartite secret sharing schemes

open access: yes, 2023
This thesis is dedicated to the study of secret sharing schemes, which are cryptographic methods to share information in a secure way. The topics that are considered in the thesis are two of the main open problems in secret sharing: the characterization of the ideal access structures and the optimization of the length of the shares for general access ...
openaire   +4 more sources

Multi-Secret Sharing Schemes [PDF]

open access: yes, 1994
A multi-secret sharing scheme is a protocol to share m arbitrarily related secrets s1,..., sm among a set of participants P. In this paper we put forward a general theory of multi-secret sharing schemes by using an information theoretical framework. We prove lower bounds on the size of information held by each participant for various access structures.
Carlo Blundo   +4 more
openaire   +1 more source

On the size of shares for secret sharing schemes [PDF]

open access: yesJournal of Cryptology, 1992
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
R. M. Capocelli   +3 more
openaire   +4 more sources

Cold atmospheric plasma‐mediated tumor microenvironment remodeling for cancer treatment

open access: yesBMEMat, EarlyView.
Schematic presentation of CAP‐mediated TME remodeling. This review summarizes recent efforts in cold atmospheric plasma (CAP) application in cancer treatment, highlighting the anticancer potential of CAP, molecular mechanisms, and future perspectives for further improvement and clinical translation.
Israr Khan   +8 more
wiley   +1 more source

Some Secret Sharing Based on Hyperplanes

open access: yesComputation
The secret sharing schemes (SSS) are widely used in secure multi-party computing and distributed computing, and the access structure is the key to constructing secret sharing schemes.
Guohui Wang, Yucheng Chen
doaj   +1 more source

ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve ...
Ruonan Shi   +4 more
doaj   +1 more source

Classifying avian drinking behaviour: ecological insights and implications in a changing world

open access: yesBiological Reviews, EarlyView.
ABSTRACT Water is a fundamental currency of life, and its availability significantly influences animal behaviour, physiology and distributions. However, our knowledge around the dependence on water for drinking and the direct and indirect mechanisms driving related behaviours remains partial in the context of changing climates. Here, we review patterns
Shannon R. Conradie, Marc T. Freeman
wiley   +1 more source

Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT

open access: yesJournal of Communications Software and Systems, 2015
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8].
Anjaneyulu Endurthi   +3 more
doaj  

Secret-Sharing Schemes for Very Dense Graphs [PDF]

open access: yesJournal of Cryptology, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Beimel, Amos   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy