Results 1 to 10 of about 40,010 (281)
Threshold cryptography based on Asmuth–Bloom secret sharing [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kaya, K., Selcuk, A. A.
core +8 more sources
Threshold Visual Cryptography Schemes With Tagged Shares [PDF]
The appearance of shares encoded by traditional visual cryptography is not easy to distinguish and meaningless. It means the shares cannot be managed efficiently nor user-friendly. A tagged visual cryptography scheme (TVCS) provides additional tag images
Pei-Ling Chiu, Kai-Hui Lee
doaj +2 more sources
Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions.
Nuwan Weerasinghe +4 more
doaj +3 more sources
A Recursive Threshold Visual Cryptography Scheme [PDF]
8 ...
Parakh, Abhishek, Kak, Subhash
openaire +4 more sources
A location privacy protection method based on blockchain and threshold cryptography [PDF]
Zhaowei Hu +4 more
doaj +2 more sources
Reaching consensus for membership dynamic in secret sharing and its application to cross-chain
The communication efficiency optimization, censorship resilience, and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant (BFT) consensus.
Yan Zhu +5 more
doaj +1 more source
Secure Online Voting System using Visual Cryptography
The development of a secure online voting system using visual cryptography is highly essential for present voting systems. Based on the current requirements and design aspects of an existing online voting system, emerging technologies are required in ...
Meher Gayatri Devi TIWARI +1 more
doaj +3 more sources
Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation
In this paper, we introduce secure groups as a cryptographic scheme representing finite groups together with a range of operations, including the group operation, inversion, random sampling, and encoding/decoding maps.
Berry Schoenmakers, Toon Segers
doaj +1 more source
R-LWE-Based Distributed Key Generation and Threshold Decryption
Ever since the appearance of quantum computers, prime factoring and discrete logarithm-based cryptography have been questioned, giving birth to the so-called post-quantum cryptography.
Ferran Alborch +2 more
doaj +1 more source
Collaborative Authentication Using Threshold Cryptography [PDF]
We propose a collaborative authentication protocol where multiple user devices (e.g., a smartphone, a smartwatch and a wristband) collaborate to authenticate the user to a third party service provider. Our protocol uses a threshold signature scheme as the main building block.
Aishajiang, Abuding +2 more
openaire +1 more source

