Results 11 to 20 of about 40,010 (281)

Research on Wallet Protection Against Currency Failure in Blockchain

open access: yesJisuanji kexue yu tansuo, 2020
The protection of blockchain wallet is the basis of secure transaction in blockchain. Private key is the core of wallet security. The private key cannot be protected based on a reliable third party.
ZHOU Jian, SUN Liyan, FU Ming
doaj   +1 more source

Anonymous Data Sharing and Access Control Based on Blockchain and Attribute-Based Cryptography [PDF]

open access: yesJisuanji gongcheng, 2023
Information security and privacy protection are critical requirements in the era of big data. Identity-based cryptography is a type of public-key cryptography that solves the main management problem of the traditional public key infrastructure.However ...
Jingyi WANG, Baixiang LIU, Ning FANG, Lingqi PENG
doaj   +1 more source

Fully distributed certificate authority based on polynomial over elliptic curve for MANET [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated ...
Ahmad Alomari
doaj   +1 more source

Geometric realization of electronic elections based on threshold secret sharing

open access: yesAdvanced Engineering Research, 2018
Introduction. One of the tasks arising in cryptography is to ensure a safe and fair conduct of e-voting. This paper details the algorithm of electronic elections particularly that part which deals with the cryptographic security.
A. V. Mazurenko, V. A. Stukopin
doaj   +1 more source

High Key Rate Quantum Conference Key Agreement With Unconditional Security

open access: yesIEEE Access, 2021
Quantum cryptography is a major ingredient of the future quantum internet that promises various secure communication tasks. Quantum conference key agreement (CKA) is an important cryptographic primitive of quantum cryptography, which provides the ...
Xiao-Yu Cao   +5 more
doaj   +1 more source

Superlinear threshold detectors in quantum cryptography [PDF]

open access: yesPhysical Review A, 2011
Rewritten for clearity. Included a discussion on detector dark counts, a discussion on how to tackle this type of loopholes, and updated references.
Lydersen, L.   +7 more
openaire   +3 more sources

Trojan-horse attacks threaten the security of practical quantum cryptography [PDF]

open access: yes, 2014
A quantum key distribution system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack.
Anisimova, Elena   +5 more
core   +3 more sources

A Novel XOR-Based Threshold Visual Cryptography with Adjustable Pixel Expansion

open access: yesApplied Sciences, 2020
A ( k , n ) visual cryptography (VC) scheme encodes a secret image into n shadows that are printed on transparencies distributed among a group of n participants secretly, and reveal the secret image by stacking no less than k of them.
Yusheng Guo   +3 more
doaj   +1 more source

Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography

open access: yesIEEE Access, 2019
While instant messaging systems bring convenience to people's lives and work, they also make it easier for malicious users to discuss and plot illegal activities.
Zhen Wang   +3 more
doaj   +1 more source

Threshold Cryptography Based on Asmuth-Bloom Secret Sharing [PDF]

open access: yes, 2006
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme.
Kaya, Kamer   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy