Results 251 to 260 of about 40,010 (281)
Some of the next articles are maybe not open access.

A JCA-based implementation framework for threshold cryptography

Seventeenth Annual Computer Security Applications Conference, 2005
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurable feature makes JCA widely used and assures its success. However, the public key cryptographic service interfaces defined by JCA are based on the conventional public key ...
null Yih Huang   +2 more
openaire   +1 more source

Threshold Cryptography Based Data Security in Cloud Computing

2015 IEEE International Conference on Computational Intelligence & Communication Technology, 2015
Cloud computing is very popular in organizations and institutions because it provides storage and computing services at very low cost. However, it also introduces new challenges for ensuring the confidentiality, integrity and access control of the data.
Sushil Kr Saroj   +3 more
openaire   +1 more source

Threshold Cryptography in Mobile Ad Hoc Networks

2005
The area of Threshold Cryptography investigates the design and analysis of protocols that distribute, in wired networks, cryptographic actions usually performed by a single party into multi-party variants, where the original action is successfully performed only if at least a certain threshold of the participants are available and not corrupted.
Giovanni Di Crescenzo   +2 more
openaire   +1 more source

Security of Ad Hoc Networks and Threshold Cryptography

2005 International Conference on Wireless Networks, Communications and Mobile Computing, 2005
A mobile ad hoc network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies allowing people and devices to inter-network without any preexisting communication infrastructure. Taking into account its nature and challenges and security issues, we briefly discuss current security ...
L. Ertaul, N. Chavan
openaire   +1 more source

Finding an Optimal Parameter for Threshold Cryptography

2016
Threshold cryptography is mostly used in securing the keys, which are the most important element in cryptographic systems. Threshold scheme protects the key by dividing and distributing the key among the entities in the system instead of storing it on a single server. In order to generate the key again, not all the shares are needed. However, there has
Weena Janratchakool   +2 more
openaire   +1 more source

Split-and-Delegate: Threshold Cryptography for the Masses

2003
Threshold Cryptography (distributed key splitting) is traditionally employed as means to preserve the whole key against compromise, i.e., for risk reduction (coping with memory compromise) and availability (coping with denial of service). Recently, some functionality of splitting keys has been shown to be useful beyond preservation, yielding a small ...
Daniel E. Geer, Moti Yung
openaire   +1 more source

Some recent research aspects of threshold cryptography

1998
In the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Depending from the application the sender or the receiver (or both) need to use a secret key. Often we are not dealing with an individual sender/receiver, but the sender/receiver is an organization.
openaire   +1 more source

Visual cryptography and threshold schemes

2015
The essential ideas of threshold schemes for B/W visual cryptography are described.
openaire   +2 more sources

Security in quantum cryptography

Reviews of Modern Physics, 2022
Christopher Portmann, Renato Renner
exaly  

Advanced threshold signature schemes leveraging isogeny-based cryptography

Global Journal of Engineering and Technology Advances
This paper investigates the use of threshold signature schemes in isogeny-based cryptosystems. By leveraging the distinct features of isogeny graphs, we propose a protocol that offers high security and practical efficiency, making it ideal for distributed ledger technologies and secure multi-party computations.
null Mohammed El Baraka   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy