Results 11 to 20 of about 1,107,668 (334)
Verifiable Threshold Quantum State Sharing Scheme
Quantum state sharing (QSTS) is a hot topic in quantum cryptography. However, majority of the current structures cannot resist the participant's fraud well during the initial state reconstruction phase.
Hao Cao, Wenping Ma
doaj +2 more sources
Brakke’s inequality for the thresholding scheme [PDF]
AbstractWe continue our analysis of the thresholding scheme from the variational viewpoint and prove a conditional convergence result towards Brakke’s notion of mean curvature flow. Our proof is based on a localized version of the minimizing movements interpretation of Esedoğlu and the second author.
Laux, T., Otto, F.
openaire +4 more sources
The work presents a new signature scheme, called the multi-threshold signature, which generalizes the concept of multisignature and threshold signature.
Bartosz Nakielski +2 more
doaj +1 more source
Dynamic Multi-threshold Metering Schemes [PDF]
A metering scheme is a protocol in which an audit agency is able to measure the interaction between clients and servers on the web during a certain number of time frames. Naor and Pinkas [7] considered metering schemes in which any server is able to construct a proof to be sent to the audit agency if and only if it has been visited by at least a number,
BLUNDO, Carlo +3 more
openaire +2 more sources
Verifiable (n,n) Threshold Quantum Secret Sharing Scheme [PDF]
This paper constructs a class of verifiable secret sharing scheme based on Chinese Remainder Theorem and Bell states.In the distribution phase,Alice distributes the shares to the participants through the quantum secure channel.In the recovery phase,Alice
MA Min,LI Zhihui,XU Tingting
doaj +1 more source
Threshold Schemes with Disenrollment [PDF]
When a shadow of a threshold scheme is publicized, new shadows have to be reconstructed and redistributed in order to maintain the same level of security. In this paper we consider threshold schemes with disenrollment capabilities where the new shadows can be created by broadcasts through a public channel. We establish a lower bound on the size of each
B. Blakley +3 more
openaire +1 more source
How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update
Threshold homomorphic encryption (Threshold HE) schemes are modified homomorphic encryption schemes to be suitable for privacy-preserving data integration and analysis.
Eunkyung Kim +5 more
doaj +1 more source
Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [PDF]
Voting is a commonly used method in modern democratic society,involving many fields such as politics,stock companies,court decisions,etc.Voting is regarded as a specific form of balloting,with only two candidates in pro and con.Blockchain is a digital ...
FAN Jia-xing, WANG Zhi-wei
doaj +1 more source
Multisecret Threshold Schemes [PDF]
A threshold scheme is a system that protects a secret (key) among a group of participants in such a way that it can only be reconstructed from the joint information held by some predetermined number of these participants. In this paper we extend this problem to one where there is more than one secret that participants can reconstruct using the ...
Wen-Ai Jackson +2 more
openaire +1 more source
A proposal for highly tunable optical parametric oscillation in silicon micro-resonators [PDF]
We propose a novel scheme for continuous-wave pumped optical parametric oscillation (OPO) inside silicon micro-resonators. The proposed scheme not only requires a relative low lasing threshold, but also exhibits extremely broad tunability extending from ...
Johnson, T. J. +4 more
core +1 more source

