Results 21 to 30 of about 55,119 (73)

Crucial and Redundant Shares and Compartments in Secret Sharing [PDF]

open access: yesarXiv, 2019
Secret sharing is the well-known problem of splitting a secret into multiple shares, which are distributed to shareholders. When enough or the correct combination of shareholders work together the secret can be restored. We introduce two new types of shares to the secret sharing scheme of Shamir.
arxiv  

Sharing a River [PDF]

open access: yesJournal of Economic Theory, 2002
Abstract A group of agents located along a river have quasi-linear preferences over water and money. We ask how the water should be allocated and what money transfers should be performed. The core lower bounds require that no coalition should get less than the welfare it could achieve by using the water it controls. The aspiration upper bounds demand
Ambec, Stefan, Sprumont, Yves
openaire   +8 more sources

Threshold Multi Secret Sharing Using Elliptic Curve and Pairing [PDF]

open access: yesarXiv, 2016
Secret Sharing techniques are now the building blocks of several security protocols. A (t;n) threshold secret sharing scheme is one in which t or more participant can join together to retrieve the secret.Traditional single secret sharing schemes are modified and generalized to share multiple secrets.Use of elliptic curve and pairing in secret sharing ...
arxiv  

Impact of Contextual Factors on Snapchat Public Sharing [PDF]

open access: yesarXiv, 2019
Public sharing is integral to online platforms. This includes the popular multimedia messaging application Snapchat, on which public sharing is relatively new and unexplored in prior research. In mobile-first applications, sharing contexts are dynamic. However, it is unclear how context impacts users' sharing decisions.
arxiv  

Studying and Modeling the Connection between People's Preferences and Content Sharing [PDF]

open access: yes, 2014
People regularly share items using online social media. However, people's decisions around sharing---who shares what to whom and why---are not well understood. We present a user study involving 87 pairs of Facebook users to understand how people make their sharing decisions.
arxiv   +1 more source

Social Secret Sharing for Resource Management in Cloud [PDF]

open access: yesarXiv, 2013
We first explain the notion of secret sharing and also threshold schemes, which can be implemented with the Shamir's secret sharing. Subsequently, we review social secret sharing (NSG'10,NS'10) and its trust function. In a secret sharing scheme, a secret is shared among a group of players who can later recover the secret.
arxiv  

Lossless Secret Image Sharing Schemes [PDF]

open access: yesarXiv, 2015
Secret image sharing deals with splitting confidential images into several shares and the original image can be reconstructed from the qualified subset of the shares. Secret sharing schemes are used in transmission and storage of private medical images and military secrets. Increased confidentiality and availability are the major achievements.
arxiv  

Simple and Efficient Secret Sharing Schemes for Sharing Data and Image [PDF]

open access: yes(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, 404-409 ,, 2015
Secret sharing is a new alternative for outsourcing data in a secure way.It avoids the need for time consuming encryption decryption process and also the complexity involved in key management.The data must also be protected from untrusted cloud service providers.Secret sharing based solution provides secure information dispersal by making shares of the
arxiv  

Share and share alike [PDF]

open access: yesBioentrepreneur, 2015
Matthew P Owens, Samuel K Sia
openaire   +2 more sources

Learning Sparse Sharing Architectures for Multiple Tasks [PDF]

open access: yesarXiv, 2019
Most existing deep multi-task learning models are based on parameter sharing, such as hard sharing, hierarchical sharing, and soft sharing. How choosing a suitable sharing mechanism depends on the relations among the tasks, which is not easy since it is difficult to understand the underlying shared factors among these tasks. In this paper, we propose a
arxiv  

Home - About - Disclaimer - Privacy