Results 241 to 250 of about 40,010 (281)
Some of the next articles are maybe not open access.

Group authentication using paillier threshold cryptography

2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN), 2013
In recent years, the exponentially increasing number of portable wireless devices has made it infeasible to authenticate each individual device of a group separately. With the current trend, the proliferation of devices in the future is said to accelerate further.
Nitish Mehta   +4 more
openaire   +1 more source

Multi-key leakage-resilient threshold cryptography

Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013
With the goal of ensuring availability of security services such as encryption and authentication, we initiate the study of leakage-resilient threshold cryptography, for achieving formal security guarantee under various key-exposure attacks. A distinctive property of threshold cryptosystems is that a threshold number of secret keys are used in the main
Zhang, C   +5 more
openaire   +2 more sources

Multi-factor authentication using threshold cryptography

2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016
Multi-Factor Authentication is used as a foolproof solution to various issues involved in present day critical authentication systems. However, it comes with the overhead of employing multiple authentication programs to complete the process. Moreover, current multi-factor authentication schemes require all intermediate One Time Passwords(OTPs) to be ...
Vishnu Venukumar, Vinod Pathari
openaire   +1 more source

A Weighted Threshold Visual Cryptography

2019
Over the past years, a visual secret sharing scheme gave each share the same ability to reconstruct the secret image. That means each participant had the same significance to reveal the secret. However, it is not realistic in real world for some applications.
Tai-Yuan Tu   +3 more
openaire   +1 more source

Some Extensions on Threshold Visual Cryptography Schemes

The Computer Journal, 2009
Droste [CRYPTO’96] proposed a construction of threshold visual cryptography scheme (TVCS) under the visual cryptography model of Naor and Shamir, i.e. the visual cryptography model with the underlying operation OR. In this article, we give three extensions of TVCS.
F. Liu, C. Wu, X. Lin
openaire   +1 more source

Visual cryptography and threshold schemes

IEEE Potentials, 1999
Visual cryptography is a secret sharing scheme that uses the human visual system to perform computations. In this article, we present some background to traditional secret-sharing schemes, then explain visual schemes, describing some of the basic construction techniques used.
openaire   +1 more source

The Dark Side of Threshold Cryptography

2003
It is typical for a cryptographic technology to be useful in its primary goal and applications, yet to exhibit also a dark side, namely to allow abuses in some other situations. Examples are subliminal channels in strong (randomized) signature schemes, employing authentication for encryption, kleptography exploiting strong randomness, etc.
Shouhuai Xu, Moti Yung
openaire   +1 more source

Multilayer multicast key management with threshold cryptography

SPIE Proceedings, 2004
The problem of distributing multimedia securely over the Internet is often viewed as an instance of secure multicast communication, in which multicast messages are protected by a group key shared among the group of clients. One important class of key management schemes makes use of a hierarchical key distribution tree. Constructing a hierarchical tree
Scott D. Dexter   +2 more
openaire   +1 more source

Visual Cryptography for colour images using multilevel thresholding

2019 Third International Conference on Inventive Systems and Control (ICISC), 2019
Visual Cryptography Scheme, is even known as VCS. It is actually a cryptography method to encrypt an image by dividing it in parts called shares, where decryption is performed using Human Visual System (HVS), only by overlapping all these shares. The image to be encrypted is called a secret image.
Pooja Kashyap, A. Renuka
openaire   +1 more source

Threshold progressive visual cryptography construction with unexpanded shares

Multimedia Tools and Applications, 2015
Differently from traditional secret sharing, progressive secret sharing can gain clearer recovered secret image with more shares. However, previous progressive visual secret sharing (PVSS) schemes with unexpanded shares are only for case (2, n) other than general threshold (case), which will restrict the application range.
Xuehu Yan, Shen Wang, Xiamu Niu
openaire   +1 more source

Home - About - Disclaimer - Privacy