نتایج جستجو برای: threshold access structures

تعداد نتایج: 880041  

Abbas Cheraghi,

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...

2011
Nuttapong Attrapadung Benoît Libert Elie de Panafieu

Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for fine-grained access control on encrypted data. In its key-policy flavor, the primitive enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that specify which ciphertexts the key holder will be allowed to decrypt. In most ABE systems, the ciphertext siz...

Abstract The liquid crystal director distribution is determined for a confined chiral nematic slab. The molecular director distribution of the field-controlled chiral nematic slab is directly calculated. The director profiles for the tilt and the twist angles, under different applied fields, are calculated in the slab with weak boundary conditions. Then, the dependence of the threshold field on...

2012
Cheng Guo Chin-Chen Chang Chuan Qin Feng Chia

Visual cryptography (VC) has been developed extensively based on its practicability. These schemes can encode a black-and-white secret image into several shadow images, and, by stacking a certain number of shadow images, can retrieve the secret image through the human visual system. In this paper, we employ Hsu et al.’s ideal multi-threshold secret sharing scheme based on monotone span programs...

Journal: :IACR Cryptology ePrint Archive 2015
Mehrdad Nojoumian Douglas R. Stinson

Due to the rapid growth of the next generation networking and system technologies, computer networks require new design and management. In this context, security, and more specifically, access structures have been one of the major concerns. As such, in this article, sequential secret sharing (SQS), as an application of dynamic threshold schemes, is introduced. In this new cryptographic primitiv...

اعتماد, کورش, حیدری, علیرضا, صادقی, صدف, فلاح, فاطمه, لطفی, منصوره, پناهی, محمد حسین,

Background and Objectives: Data plays a major role in a health care system in development planning and health services support if they are correct, timely and accessible. The data of the Ministry of Health are not readily available and the limited access reduces their value. The aim of this study was to explore the challenges of access to the data of the Iranian Ministry of Health. Methods: Th...

Journal: :Information Technology for Development 2021

Information and communication technology (ICT) has a crucial role in the individual, businesses, cooperative lives of citizens. Many studies on ICT access tend to concentrate supply side improving ICTs; however, limited efforts have been made examine households’ demand side. Thus, this study contributes extant literature by investigating households. It also examines socioeconomic characteristic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید