Results 101 to 110 of about 121,303 (160)
From Latent Manifolds to Targeted Molecular Probes: An Interpretable, Kinome-Scale Generative Machine Learning Framework for Family-Based Kinase Ligand Design. [PDF]
Verkhivker G, Kassab R, Krishnan K.
europepmc +1 more source
IGFBP-6 regulates breast cancer cell cycle progression by promoting exit out of G1. [PDF]
Lariz FJ +3 more
europepmc +1 more source
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature. [PDF]
Zhang Y, Duan P, Li C, Zhang H, Ahmad H.
europepmc +1 more source
Threshold Ring Signature Scheme based on the Curve
openaire
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cryptanalysis of multivariate threshold ring signature schemes
Information Processing Letters, 2023In this note, the authors provide an attack on the anonymity of three multivariate threshold ring signatures. First, the authors provide the necessary background for understanding the building blocks needed to analyze multivariate threshold ring signatures. An important point to note is that after \(t\) or more users sign a message, a combiner computes
Satyam Omar +2 more
openaire +2 more sources
An efficient multivariate threshold ring signature scheme
Computer Standards & Interfaces, 2021Abstract At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification protocol with security reduction to the MQ problem and impersonation probability 2 3 . Petzoldt et al. (AAECC 2013) extended that protocol into a threshold ring signature scheme, which later was improved by Zhang and Zhao (NSS 2014).
Dung H. Duong +3 more
openaire +2 more sources
Certificateless Threshold Ring Signature
Information Sciences, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
chang, shuang +3 more
openaire +2 more sources
Confessible Threshold Ring Signatures
2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006We present two threshold ring signature schemes with different properties. One focuses on the confessibility (or signer verifiability) and the denouncibility properties. The other focuses on the threshold-confessibility. Our schemes are built on generic ring signature schemes and can be easily adapted to most existing ring signature schemes.
Yu-shian Chen +3 more
openaire +1 more source

