搜索结果: 1-8 共查到“理学 Secret sharing”相关记录8条 . 查询时间(0.106 秒)
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem
rational cryptography computational strict Nash equilibrium stability with respect to trembles Asmuth-Bloom sharing scheme
2012/12/4
The design of rational cryptographic protocols is a recently created research area at the intersection of cryptography and game theory.At TCC’10, Fuchsbauer et al. introduced two equilibrium notions (...
Entropic Inequalities for a Class of Quantum Secret Sharing States
entropic inequalities monotone span programs quantum secret sharing stabilizer states von Neumann entropy
2010/10/18
It is well-known that von Neumann entropy is nonmonotonic unlike Shannon entropy (which is
monotonically nondecreasing). Consequently, it is difficult to relate the entropies of the subsystems of a g...
Secret Sharing LDPC Codes for the Constrained Gaussian Wiretap Channel
Secret Sharing LDPC Codes Constrained Gaussian Wiretap Channel
2010/12/7
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a
destination intend to share secret information over a Gaussian channel in the presence of a wiretapper wh...
Experimentally Feasible Security Check for n-qubit Quantum Secret Sharing
Experimentally Feasible Security Check for n-qubit Quantum Secret Sharing
2010/10/21
In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the HBB scheme presented by Hillery, Buˇzek and Berthiaume [Phys. Rev A 59, 1829 (1999)]. We ...
In this paper a secret sharing scheme based on the word prob-lem in groups is introduced. The security of the scheme and possible variations are discussed in section 2. The article concludes with the ...
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
Secret Sharing Scheme Threshold Changeability Information Rate Security Rate Chinese Remainder Theorem Dealer Free Update.
2012/12/3
In a (r, n)-threshold secret sharing scheme, no group of (r − 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time. In order to d...
Multiparty Quantum Secret Sharing of Secure Direct
Communication Using Teleportation
quantum secret sharing quantum teleportation
2007/8/15
2007Vol.47No.3pp.454-458DOI:
Multiparty Quantum Secret Sharing of Secure Direct
Communication Using Teleportation
WANG Jian, ZHANG Quan, and TANG Chao-Jing
School of El...
Quantum secret sharing for general access structures
Quantum secret sharing general access structures
2010/10/15
We explore the conversion of classical secret-sharing schemes to quantum ones, and how this can be used to give efficient qss schemes for general adversary structures. Our first result is that quantum...