Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Secret sharing

Secret sharing schemes, introduced in [Blak79, Sham79], can be used to approach this situation for private storage, too. However, in this case, several shares must remain intact for the secret to be recovered and must be recollected each time the secret is used. [Pg.112]

Pede92 Torben Pryds Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing Crypto 91, LNCS 576, Springer-Verlag, Berlin 1992, 129-140. [Pg.382]

RaBe89 Tal Rabin, Michael Ben-Or Verifiable Secret Sharing and Multiparty Protocols with Honest Majority 21st Symposium on Theory of Computing (STOC) 1989, ACM, New York 1989, 73-85. [Pg.383]

Another class of QKD protocols is based on entangled quantum systems [162]. Both Alice and Bob receive one member of a pair of particles obtained from the parametric downconversion process [161]. These particles feature nonclassical properties results of suitably chosen measurements on the particles exhibit, even when spatially separated, correlations that cannot be explained by any classical theory consistent with local realism. When Alice and Bob decide to establish a key, they perform independent measurements in randomly chosen bases (from a given nonorthogonal set), and using a public channel they arrive at a secret shared key in a way similar to BB84. Later developments showed a way to improve the security of this protocol by means of the so-called entanglement purification techniques [163]. [Pg.570]

W. Tittel, H. Zbinden, and N. Gisin, Quantum Secret Sharing Using Pseudo-GHZ states, Los Alamos e-print archive quant-ph/9912035 (1999). [Pg.599]

Proactive recovery transforms a system state containing one or more errors (or even visible faults) into a state without detected errors or faults. Proactive techniques were presented in [13] as a long-term protection against break-ins and implemented, for example, in the scope of an on-line certification-authority system [14]. These techniques borrow ideas from proactive discovery protocols (e.g., IPSec [15]), session-key refreshment (SSL/TLS [16]) or secret sharing algorithms [17]. Hence, proactive security is defined as a combination of periodic refreshment and distribution [18,19]. [Pg.35]

Plus, this edition of Total Synthesis marks the first ever collaboration of the chemical underground. Throughout the book you will find recipes, secrets and discussions contributed by the worlds leading underground chemists. They have shared their knowledge so that you may get the best education available. So enjoy ... [Pg.5]

As is the case with most specialty organic compounds, pyridine sales are generally not pubHcized, and industrial processes for their manufacture are either retained as trade secrets or patented (see Patents and trade secrets). Up to about 1950, most pyridines were isolated from coal-tar fractions however, after 1950 synthetic manufacture began to take an ever-increasing share of products sold. By 1988, over 95% of all pyridines were produced by synthetic methods. [Pg.322]

Chemokines are a family of small cytokines, or proteins secreted by cells. Proteins are classified as chemokines according to shared structural characteristics such as small size (8-10 kDa in size), and the presence of four... [Pg.355]

There are 17 human type I IFN genes, all clustering on chromosome 9. They are intronless and encode secretory signal peptide sequences that are proteolytically cleaved prior to secretion from the cell. Type I IFNs are genetically and structurally closely related. They range in length from 161 to 208 amino acids and have apparent molecular weights of 15-24 kDa (Table 1) (Chen et al. 2004). The different subtypes of human IFN-a have approximately 50% amino acid sequence identity, whereas IFN-a shares approximately 22% amino acid identity with human IFN-p and 37% with human IFN-m (Chen et al. 2004). [Pg.205]

The interactions between the endocrine and neural systems of the GIT are complex, include shared signaling molecules, and can be hard to separate. Therefore, it is likely that the influence(s) of some phytochemicals will cross over between neural and non-neural pathways. Corresponding with this, lumenal administration of capsaicin interacts with visceral neurons to increase GIT motility (Zittel et al., 2001 Topcu et al, 2002) and abrogates the decreased electrolyte and fluid secretion caused by piperine (Capasso et al., 2002). [Pg.170]

CF-related diabetes shares characteristics of both type 1 and type 2 diabetes mellitus but is categorized separately. The primary cause of CFRD is insulin deficiency resulting from both reduced functional pancreatic islet cells and increased islet amyloid deposition. Insulin secretion is delayed in response to glucose challenge, and absolute insulin secretion over time is reduced. Some insulin resistance may also be present in CFRD however, sensitivity may be increased in CF patients without diabetes.8... [Pg.247]

The MMPs are synthesized as preproproteins and are secreted as latent proproteins. Most MMPs share a common domain structure of a propeptide (about 80 amino acids) that has a conserved cysteine ligated to the catalytic zinc thus maintaining latency [10], a catalytic domain (about 180 amino acids), and a C-terminal domain (about 210 amino acids)... [Pg.71]

Kilby, Janice Easton, Deborah Morgenthal and Terry Taylor. The book of wizard parties in which the wizard shares the secrets of creating enchanted gatherings [authors, Janice Eaton Kilby, Deborah Morgenthal, Terry Taylor illustrated by Marla Baggetta. New York Lark Books, 2001. 144p. ISBN 1579902928... [Pg.578]

The first study was conducted to determine whether carotenoids and cholesterol share common pathways (transporters) for their intestinal absorption (During et al., 2005). Differentiated Caco-2 cells on membranes were incubated (16 h) with a carotenoid (1 pmol/L) with or without ezetimibe (EZ Zetia, an inhibitor of cholesterol transport), and with or without antibodies against the receptors, cluster determinant 36 (CD36) and scavenger receptor class B, type I (SR-BI). Carotenoid transport in Caco-2 cells (cellular uptake + secretion) was decreased by EZ (lOmg/L) as follows P-C and a-C (50% inhibition) P-cryptoxanthin and LYC (20%) LUT ZEA (1 1) (7%). EZ reduced cholesterol transport by 31%, but not retinol transport. P-Carotene transport was also inhibited by anti-SR-BI, but not by anti-CD36. The inhibitory effects of EZ and anti-SR-BI on P-C transport... [Pg.374]


See other pages where Secret sharing is mentioned: [Pg.282]    [Pg.493]    [Pg.566]    [Pg.573]    [Pg.573]    [Pg.408]    [Pg.282]    [Pg.493]    [Pg.566]    [Pg.573]    [Pg.573]    [Pg.408]    [Pg.181]    [Pg.40]    [Pg.92]    [Pg.480]    [Pg.481]    [Pg.573]    [Pg.642]    [Pg.650]    [Pg.986]    [Pg.25]    [Pg.344]    [Pg.196]    [Pg.324]    [Pg.384]    [Pg.88]    [Pg.171]    [Pg.1042]    [Pg.359]    [Pg.471]    [Pg.712]    [Pg.151]    [Pg.157]    [Pg.12]    [Pg.192]    [Pg.112]   


SEARCH



Shared

Shares

Sharing

© 2024 chempedia.info