Results 21 to 30 of about 55,119 (73)
Crucial and Redundant Shares and Compartments in Secret Sharing [PDF]
Secret sharing is the well-known problem of splitting a secret into multiple shares, which are distributed to shareholders. When enough or the correct combination of shareholders work together the secret can be restored. We introduce two new types of shares to the secret sharing scheme of Shamir.
arxiv
Abstract A group of agents located along a river have quasi-linear preferences over water and money. We ask how the water should be allocated and what money transfers should be performed. The core lower bounds require that no coalition should get less than the welfare it could achieve by using the water it controls. The aspiration upper bounds demand
Ambec, Stefan, Sprumont, Yves
openaire +8 more sources
Threshold Multi Secret Sharing Using Elliptic Curve and Pairing [PDF]
Secret Sharing techniques are now the building blocks of several security protocols. A (t;n) threshold secret sharing scheme is one in which t or more participant can join together to retrieve the secret.Traditional single secret sharing schemes are modified and generalized to share multiple secrets.Use of elliptic curve and pairing in secret sharing ...
arxiv
Impact of Contextual Factors on Snapchat Public Sharing [PDF]
Public sharing is integral to online platforms. This includes the popular multimedia messaging application Snapchat, on which public sharing is relatively new and unexplored in prior research. In mobile-first applications, sharing contexts are dynamic. However, it is unclear how context impacts users' sharing decisions.
arxiv
Studying and Modeling the Connection between People's Preferences and Content Sharing [PDF]
People regularly share items using online social media. However, people's decisions around sharing---who shares what to whom and why---are not well understood. We present a user study involving 87 pairs of Facebook users to understand how people make their sharing decisions.
arxiv +1 more source
Social Secret Sharing for Resource Management in Cloud [PDF]
We first explain the notion of secret sharing and also threshold schemes, which can be implemented with the Shamir's secret sharing. Subsequently, we review social secret sharing (NSG'10,NS'10) and its trust function. In a secret sharing scheme, a secret is shared among a group of players who can later recover the secret.
arxiv
Lossless Secret Image Sharing Schemes [PDF]
Secret image sharing deals with splitting confidential images into several shares and the original image can be reconstructed from the qualified subset of the shares. Secret sharing schemes are used in transmission and storage of private medical images and military secrets. Increased confidentiality and availability are the major achievements.
arxiv
Simple and Efficient Secret Sharing Schemes for Sharing Data and Image [PDF]
Secret sharing is a new alternative for outsourcing data in a secure way.It avoids the need for time consuming encryption decryption process and also the complexity involved in key management.The data must also be protected from untrusted cloud service providers.Secret sharing based solution provides secure information dispersal by making shares of the
arxiv
Learning Sparse Sharing Architectures for Multiple Tasks [PDF]
Most existing deep multi-task learning models are based on parameter sharing, such as hard sharing, hierarchical sharing, and soft sharing. How choosing a suitable sharing mechanism depends on the relations among the tasks, which is not easy since it is difficult to understand the underlying shared factors among these tasks. In this paper, we propose a
arxiv