Results 231 to 240 of about 40,010 (281)
Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source
Quantum-aware secure blockchain intrusion detection system for industrial IoT networks. [PDF]
Hussain N +4 more
europepmc +1 more source
Post-Quantum Revocable Linkable Ring Signature Scheme Based on SPHINCS+ for V2G Scenarios. [PDF]
Liu S, Du YN, Wang XA, Hu X, Su HE.
europepmc +1 more source
Lightweight Quantum Authentication and Key Agreement Scheme in the Smart Grid Environment. [PDF]
Jiang Z, Shi RH.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Threshold quantum cryptography
Physical Review A, 2005We present the concept of threshold collaborative unitary transformation or threshold quantum cryptography, which is a kind of quantum version of threshold cryptography. Threshold quantum cryptography states that classical shared secrets are distributed to several parties and a subset of them, whose number is greater than a threshold, collaborates to ...
Yuuki Tokunaga +2 more
openaire +3 more sources
Contrast Optimal Threshold Visual Cryptography Schemes
SIAM Journal on Discrete Mathematics, 2003The Threshold Visual Cryptography Schemes (VCS) were introduced by \textit{M. Naor} and \textit{A. Shamir} [Lect. Notes Comput. Sci. 950, 1--12 (1995; Zbl 0878.94048)] and have been widely studied since then. A \((k,n)\)-threshold VCS is a method of sharing a secret (black and white) image among a set of \(n\) participants, giving to each of them a ...
BLUNDO, Carlo +3 more
openaire +5 more sources
European Transactions on Telecommunications, 1994
AbstractIn the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Large bank transactions require two people to sign, implying two senders. So the power to generate a valid transaction is shared.
openaire +3 more sources
AbstractIn the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Large bank transactions require two people to sign, implying two senders. So the power to generate a valid transaction is shared.
openaire +3 more sources
Dynamic threshold secret reconstruction and its application to the threshold cryptography
Information Processing Letters, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Harn, Lein, Hsu, Ching-Fang
openaire +4 more sources
Optimal Colored Threshold Visual Cryptography Schemes
Designs, Codes and Cryptography, 2005Visual cryptography schemes allow a dealer to divide a secret image into \(n\) shares which can then be distributed to the participants. Part of the participants receive special shares, with special properties which allow them to recover the original image from the shares they have. Such shares are considered to be all in the same set, and the sets are
CIMATO S. +2 more
openaire +4 more sources

