Results 131 to 140 of about 342,314 (174)
Some of the next articles are maybe not open access.
Efficient democratic group signatures with threshold traceability
Journal of Shanghai Jiaotong University (Science), 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
He, Guo-feng +3 more
openaire +1 more source
Demystifying Threshold Elliptic Curve Digital Signature Algorithm for MultiParty Applications
Australasian Computer Science Week, 2023Elliptic Curve Digital Signature Algorithm (ECDSA) is a crucial authentication component of many modern internet and communication systems. It is used in different domains such as cryptocurrency, IoT, e-health, e-banking, e-governance, etc.
Bachar Kachouh +3 more
semanticscholar +1 more source
Group authorization using threshold signatures for medical procedures
2017 9th International Conference on Communication Systems and Networks (COMSNETS), 2017Digitalisation of the health sector is being adopted by many countries to deliver reliable healthcare services. In healthcare organisations, frauds are rampant possessing a serious threat to good governance. To control such malpractices we present the design of a system for group authorization in healthcare organisations.
Preeti Nagar, Divyashikha Sethia
openaire +1 more source
Improved Threshold Ring Signature for Ad-Hoc Group
2006 International Conference on Wireless Communications, Networking and Mobile Computing, 2006A number of peer to peer (P2P) systems as well as mobile ad-hoc networks (MANETs) fall into the category of ad hoc groups. Their needs for security have been widely recognized, so some signature schemes had been introduced for the ad hoc group. On the basis of analyzing those schemes, we propose a threshold ring signature from bilinear pairings for ad ...
Junfang Xiao +3 more
openaire +1 more source
On/Off Threshold Group Signature Scheme
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009On/Off threshold group signature scheme is proposed. Comparing to the existing threshold group signature schemes, the scheme not only can satisfy the properties of threshold group signature, but also has the advantages such as high real-time efficiency, withstanding conspiracy attack etc.
openaire +1 more source
A Lattice-Based Threshold Signature Scheme for IoT Applications
2025 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF)The advancement of quantum computing threatens classical cryptographic systems, such as RSA and ECDSA, which can be broken by quantum algorithms like Shor's algorithm.
E. Kustov
semanticscholar +1 more source
Distributed and dynamic threshold group signature scheme
2008 11th IEEE Singapore International Conference on Communication Systems, 2008A distributed and dynamic threshold group signature scheme without a designated group manager is proposed in this paper. The proposed scheme not only can satisfy the properties of threshold group signature, but also has distributed and dynamic properties, that is, the proposed scheme allows that any t or more group members collaboratively admit ...
openaire +1 more source
A New Threshold Ring Signature for Ad-hoc Group
2007 Second International Conference on Communications and Networking in China, 2007A number of peer to peer (P2P) systems as well as mobile ad-hoc networks (MANETs) fall into the category of ad hoc groups. Their needs for security have been widely recognized. Following this line, some signature schemes had introduced for ad hoc group. On the based of analyzing those scheme, we propose a threshold ring signature from bilinear pairings
Junfang Xiao, Guihua Zeng
openaire +1 more source
A novel quantum (t, n) threshold group signature based on d-dimensional quantum system
Quantum Information Processing, 2021M. Gao, Wei Yang, Yang Liu
semanticscholar +1 more source
2012 World Congress on Information and Communication Technologies, 2012
Cloud computing refers to the ability to access and manage information stored on remote servers, using any Internet-enabled platform, including smart phones. In the cloud, any user can can access and/or remotely store respective data with minimal management effort or service provider interaction.
Aaradhana A. Deshmukh +2 more
openaire +3 more sources
Cloud computing refers to the ability to access and manage information stored on remote servers, using any Internet-enabled platform, including smart phones. In the cloud, any user can can access and/or remotely store respective data with minimal management effort or service provider interaction.
Aaradhana A. Deshmukh +2 more
openaire +3 more sources

