Results 11 to 20 of about 1,111,411 (282)

An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages

open access: yesIEEE Access, 2019
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj   +3 more sources

Improvement of lightweight threshold group signature scheme

open access: yes网络与信息安全学报, 2020
In order to improve the security and efficiency of threshold group signature in 5G environment,a new scheme was proposed.The core idea was to introduce message token and dynamic identity to improve the freshness of authentication information and increase
Zhirong ZHU   +3 more
doaj   +3 more sources

Multi-threshold signature

open access: yesJournal of Telecommunications and Information Technology, 2023
The work presents a new signature scheme, called the multi-threshold signature, which generalizes the concept of multisignature and threshold signature.
Bartosz Nakielski   +2 more
doaj   +1 more source

Dynamic Multi-threshold Metering Schemes [PDF]

open access: yes, 2001
A metering scheme is a protocol in which an audit agency is able to measure the interaction between clients and servers on the web during a certain number of time frames. Naor and Pinkas [7] considered metering schemes in which any server is able to construct a proof to be sent to the audit agency if and only if it has been visited by at least a number,
BLUNDO, Carlo   +3 more
openaire   +2 more sources

Verifiable (n,n) Threshold Quantum Secret Sharing Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
This paper constructs a class of verifiable secret sharing scheme based on Chinese Remainder Theorem and Bell states.In the distribution phase,Alice distributes the shares to the participants through the quantum secure channel.In the recovery phase,Alice
MA Min,LI Zhihui,XU Tingting
doaj   +1 more source

Threshold Schemes with Disenrollment [PDF]

open access: yesProceedings. IEEE International Symposium on Information Theory, 2005
When a shadow of a threshold scheme is publicized, new shadows have to be reconstructed and redistributed in order to maintain the same level of security. In this paper we consider threshold schemes with disenrollment capabilities where the new shadows can be created by broadcasts through a public channel. We establish a lower bound on the size of each
B. Blakley   +3 more
openaire   +1 more source

Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [PDF]

open access: yesJisuanji kexue, 2022
Voting is a commonly used method in modern democratic society,involving many fields such as politics,stock companies,court decisions,etc.Voting is regarded as a specific form of balloting,with only two candidates in pro and con.Blockchain is a digital ...
FAN Jia-xing, WANG Zhi-wei
doaj   +1 more source

A proposal for highly tunable optical parametric oscillation in silicon micro-resonators [PDF]

open access: yes, 2008
We propose a novel scheme for continuous-wave pumped optical parametric oscillation (OPO) inside silicon micro-resonators. The proposed scheme not only requires a relative low lasing threshold, but also exhibits extremely broad tunability extending from ...
Johnson, T. J.   +4 more
core   +1 more source

Multisecret Threshold Schemes [PDF]

open access: yes, 2007
A threshold scheme is a system that protects a secret (key) among a group of participants in such a way that it can only be reconstructed from the joint information held by some predetermined number of these participants. In this paper we extend this problem to one where there is more than one secret that participants can reconstruct using the ...
Wen-Ai Jackson   +2 more
openaire   +1 more source

How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update

open access: yesIEEE Access, 2020
Threshold homomorphic encryption (Threshold HE) schemes are modified homomorphic encryption schemes to be suitable for privacy-preserving data integration and analysis.
Eunkyung Kim   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy