Results 241 to 250 of about 40,010 (281)
Some of the next articles are maybe not open access.
Group authentication using paillier threshold cryptography
2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN), 2013In recent years, the exponentially increasing number of portable wireless devices has made it infeasible to authenticate each individual device of a group separately. With the current trend, the proliferation of devices in the future is said to accelerate further.
Nitish Mehta +4 more
openaire +1 more source
Multi-key leakage-resilient threshold cryptography
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013With the goal of ensuring availability of security services such as encryption and authentication, we initiate the study of leakage-resilient threshold cryptography, for achieving formal security guarantee under various key-exposure attacks. A distinctive property of threshold cryptosystems is that a threshold number of secret keys are used in the main
Zhang, C +5 more
openaire +2 more sources
Multi-factor authentication using threshold cryptography
2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016Multi-Factor Authentication is used as a foolproof solution to various issues involved in present day critical authentication systems. However, it comes with the overhead of employing multiple authentication programs to complete the process. Moreover, current multi-factor authentication schemes require all intermediate One Time Passwords(OTPs) to be ...
Vishnu Venukumar, Vinod Pathari
openaire +1 more source
A Weighted Threshold Visual Cryptography
2019Over the past years, a visual secret sharing scheme gave each share the same ability to reconstruct the secret image. That means each participant had the same significance to reveal the secret. However, it is not realistic in real world for some applications.
Tai-Yuan Tu +3 more
openaire +1 more source
Some Extensions on Threshold Visual Cryptography Schemes
The Computer Journal, 2009Droste [CRYPTO’96] proposed a construction of threshold visual cryptography scheme (TVCS) under the visual cryptography model of Naor and Shamir, i.e. the visual cryptography model with the underlying operation OR. In this article, we give three extensions of TVCS.
F. Liu, C. Wu, X. Lin
openaire +1 more source
Visual cryptography and threshold schemes
IEEE Potentials, 1999Visual cryptography is a secret sharing scheme that uses the human visual system to perform computations. In this article, we present some background to traditional secret-sharing schemes, then explain visual schemes, describing some of the basic construction techniques used.
openaire +1 more source
The Dark Side of Threshold Cryptography
2003It is typical for a cryptographic technology to be useful in its primary goal and applications, yet to exhibit also a dark side, namely to allow abuses in some other situations. Examples are subliminal channels in strong (randomized) signature schemes, employing authentication for encryption, kleptography exploiting strong randomness, etc.
Shouhuai Xu, Moti Yung
openaire +1 more source
Multilayer multicast key management with threshold cryptography
SPIE Proceedings, 2004The problem of distributing multimedia securely over the Internet is often viewed as an instance of secure multicast communication, in which multicast messages are protected by a group key shared among the group of clients. One important class of key management schemes makes use of a hierarchical key distribution tree. Constructing a hierarchical tree
Scott D. Dexter +2 more
openaire +1 more source
Visual Cryptography for colour images using multilevel thresholding
2019 Third International Conference on Inventive Systems and Control (ICISC), 2019Visual Cryptography Scheme, is even known as VCS. It is actually a cryptography method to encrypt an image by dividing it in parts called shares, where decryption is performed using Human Visual System (HVS), only by overlapping all these shares. The image to be encrypted is called a secret image.
Pooja Kashyap, A. Renuka
openaire +1 more source
Threshold progressive visual cryptography construction with unexpanded shares
Multimedia Tools and Applications, 2015Differently from traditional secret sharing, progressive secret sharing can gain clearer recovered secret image with more shares. However, previous progressive visual secret sharing (PVSS) schemes with unexpanded shares are only for case (2, n) other than general threshold (case), which will restrict the application range.
Xuehu Yan, Shen Wang, Xiamu Niu
openaire +1 more source

