Results 251 to 260 of about 40,010 (281)
Some of the next articles are maybe not open access.
A JCA-based implementation framework for threshold cryptography
Seventeenth Annual Computer Security Applications Conference, 2005The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurable feature makes JCA widely used and assures its success. However, the public key cryptographic service interfaces defined by JCA are based on the conventional public key ...
null Yih Huang +2 more
openaire +1 more source
Threshold Cryptography Based Data Security in Cloud Computing
2015 IEEE International Conference on Computational Intelligence & Communication Technology, 2015Cloud computing is very popular in organizations and institutions because it provides storage and computing services at very low cost. However, it also introduces new challenges for ensuring the confidentiality, integrity and access control of the data.
Sushil Kr Saroj +3 more
openaire +1 more source
Threshold Cryptography in Mobile Ad Hoc Networks
2005The area of Threshold Cryptography investigates the design and analysis of protocols that distribute, in wired networks, cryptographic actions usually performed by a single party into multi-party variants, where the original action is successfully performed only if at least a certain threshold of the participants are available and not corrupted.
Giovanni Di Crescenzo +2 more
openaire +1 more source
Security of Ad Hoc Networks and Threshold Cryptography
2005 International Conference on Wireless Networks, Communications and Mobile Computing, 2005A mobile ad hoc network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies allowing people and devices to inter-network without any preexisting communication infrastructure. Taking into account its nature and challenges and security issues, we briefly discuss current security ...
L. Ertaul, N. Chavan
openaire +1 more source
Finding an Optimal Parameter for Threshold Cryptography
2016Threshold cryptography is mostly used in securing the keys, which are the most important element in cryptographic systems. Threshold scheme protects the key by dividing and distributing the key among the entities in the system instead of storing it on a single server. In order to generate the key again, not all the shares are needed. However, there has
Weena Janratchakool +2 more
openaire +1 more source
Split-and-Delegate: Threshold Cryptography for the Masses
2003Threshold Cryptography (distributed key splitting) is traditionally employed as means to preserve the whole key against compromise, i.e., for risk reduction (coping with memory compromise) and availability (coping with denial of service). Recently, some functionality of splitting keys has been shown to be useful beyond preservation, yielding a small ...
Daniel E. Geer, Moti Yung
openaire +1 more source
Some recent research aspects of threshold cryptography
1998In the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Depending from the application the sender or the receiver (or both) need to use a secret key. Often we are not dealing with an individual sender/receiver, but the sender/receiver is an organization.
openaire +1 more source
Visual cryptography and threshold schemes
2015The essential ideas of threshold schemes for B/W visual cryptography are described.
openaire +2 more sources
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly
Advanced threshold signature schemes leveraging isogeny-based cryptography
Global Journal of Engineering and Technology AdvancesThis paper investigates the use of threshold signature schemes in isogeny-based cryptosystems. By leveraging the distinct features of isogeny graphs, we propose a protocol that offers high security and practical efficiency, making it ideal for distributed ledger technologies and secure multi-party computations.
null Mohammed El Baraka +1 more
openaire +1 more source

