Results 1 to 10 of about 40,010 (281)

Threshold cryptography based on Asmuth–Bloom secret sharing [PDF]

open access: yesInformation Sciences, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kaya, K., Selcuk, A. A.
core   +8 more sources

Threshold Visual Cryptography Schemes With Tagged Shares [PDF]

open access: yesIEEE Access, 2020
The appearance of shares encoded by traditional visual cryptography is not easy to distinguish and meaningless. It means the shares cannot be managed efficiently nor user-friendly. A tagged visual cryptography scheme (TVCS) provides additional tag images
Pei-Ling Chiu, Kai-Hui Lee
doaj   +2 more sources

Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems

open access: yesFuture Internet, 2023
Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions.
Nuwan Weerasinghe   +4 more
doaj   +3 more sources

Reaching consensus for membership dynamic in secret sharing and its application to cross-chain

open access: yesHigh-Confidence Computing, 2023
The communication efficiency optimization, censorship resilience, and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant (BFT) consensus.
Yan Zhu   +5 more
doaj   +1 more source

Secure Online Voting System using Visual Cryptography

open access: yesWalailak Journal of Science and Technology, 2021
The development of a secure online voting system using visual cryptography is highly essential for present voting systems. Based on the current requirements and design aspects of an existing online voting system, emerging technologies are required in ...
Meher Gayatri Devi TIWARI   +1 more
doaj   +3 more sources

Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation

open access: yesCryptography, 2023
In this paper, we introduce secure groups as a cryptographic scheme representing finite groups together with a range of operations, including the group operation, inversion, random sampling, and encoding/decoding maps.
Berry Schoenmakers, Toon Segers
doaj   +1 more source

R-LWE-Based Distributed Key Generation and Threshold Decryption

open access: yesMathematics, 2022
Ever since the appearance of quantum computers, prime factoring and discrete logarithm-based cryptography have been questioned, giving birth to the so-called post-quantum cryptography.
Ferran Alborch   +2 more
doaj   +1 more source

Collaborative Authentication Using Threshold Cryptography [PDF]

open access: yes, 2020
We propose a collaborative authentication protocol where multiple user devices (e.g., a smartphone, a smartwatch and a wristband) collaborate to authenticate the user to a third party service provider. Our protocol uses a threshold signature scheme as the main building block.
Aishajiang, Abuding   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy