Results 1 to 10 of about 1,107,668 (334)

Elliptic Threshold Secret Division Scheme

open access: yesVestnik Samarskogo Gosudarstvennogo Tehničeskogo Universiteta. Seriâ: Fiziko-Matematičeskie Nauki, 2009
The new aspect of proactive systems realization was developed based on elliptic curves arithmetic. Neural network model of secret division scheme at elliptic curve is introduced. Prolongation mechanism of the scheme was developed. Neural network model of
A. B. Spel'nikov
doaj   +2 more sources

Cheater identification in threshold scheme

open access: yesTongxin xuebao, 2005
A scheme can detection cheater correctly is proposed.The quantity of the scheme is detection and cheater identification efficient and simple.The attack is as difficult as factoring the product of large numbers.
DUAN Xiao-yi1   +3 more
doaj   +3 more sources

ID-based, Proxy, Threshold Signature Scheme [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used
Jacek Pomykała   +3 more
doaj   +1 more source

Efficient Threshold Signature Scheme [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications, 2012
In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length of ...
Sattar J, Mohammad AL-Fayoumi
openaire   +2 more sources

Secret Sharing, Zero Sum Sets, and Hamming Codes

open access: yesMathematics, 2020
A (t,n)-secret sharing scheme is a method of distribution of information among n participants such that any t>1 of them can reconstruct the secret but any t−1 cannot.
Selda Çalkavur, Patrick Solé
doaj   +1 more source

Linear Threshold Multisecret Sharing Schemes [PDF]

open access: yesInformation Processing Letters, 2010
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a differ- ent associated access structure. We consider here unconditionally secure schemes with multithreshold access structures.
Farras Ventura, Oriol   +3 more
openaire   +3 more sources

Combinatorial repairability for threshold schemes [PDF]

open access: yesDesigns, Codes and Cryptography, 2017
In this paper, we consider methods whereby a subset of players in a $(k,n)$-threshold scheme can "repair" another player's share in the event that their share has been lost or corrupted. This will take place without the participation of the dealer who set up the scheme.
Douglas R. Stinson, Ruizhong Wei
openaire   +2 more sources

A Construction Method of (2, 3) Visual Cryptography Scheme

open access: yesIEEE Access, 2020
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows, stacking qualified set of shadows will decode the secret image without computer resources.
Peng Li   +3 more
doaj   +1 more source

Characterisations of Ideal Threshold Schemes [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results on ideal threshold schemes can be discovered.
Pieprzyk, Josef, Zhang, Xian-Mo
openaire   +4 more sources

Improvement of lightweight threshold group signature scheme

open access: yes网络与信息安全学报, 2020
In order to improve the security and efficiency of threshold group signature in 5G environment,a new scheme was proposed.The core idea was to introduce message token and dynamic identity to improve the freshness of authentication information and increase
Zhirong ZHU   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy