Results 11 to 20 of about 1,111,411 (282)
An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj +3 more sources
Improvement of lightweight threshold group signature scheme
In order to improve the security and efficiency of threshold group signature in 5G environment,a new scheme was proposed.The core idea was to introduce message token and dynamic identity to improve the freshness of authentication information and increase
Zhirong ZHU +3 more
doaj +3 more sources
The work presents a new signature scheme, called the multi-threshold signature, which generalizes the concept of multisignature and threshold signature.
Bartosz Nakielski +2 more
doaj +1 more source
Dynamic Multi-threshold Metering Schemes [PDF]
A metering scheme is a protocol in which an audit agency is able to measure the interaction between clients and servers on the web during a certain number of time frames. Naor and Pinkas [7] considered metering schemes in which any server is able to construct a proof to be sent to the audit agency if and only if it has been visited by at least a number,
BLUNDO, Carlo +3 more
openaire +2 more sources
Verifiable (n,n) Threshold Quantum Secret Sharing Scheme [PDF]
This paper constructs a class of verifiable secret sharing scheme based on Chinese Remainder Theorem and Bell states.In the distribution phase,Alice distributes the shares to the participants through the quantum secure channel.In the recovery phase,Alice
MA Min,LI Zhihui,XU Tingting
doaj +1 more source
Threshold Schemes with Disenrollment [PDF]
When a shadow of a threshold scheme is publicized, new shadows have to be reconstructed and redistributed in order to maintain the same level of security. In this paper we consider threshold schemes with disenrollment capabilities where the new shadows can be created by broadcasts through a public channel. We establish a lower bound on the size of each
B. Blakley +3 more
openaire +1 more source
Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [PDF]
Voting is a commonly used method in modern democratic society,involving many fields such as politics,stock companies,court decisions,etc.Voting is regarded as a specific form of balloting,with only two candidates in pro and con.Blockchain is a digital ...
FAN Jia-xing, WANG Zhi-wei
doaj +1 more source
A proposal for highly tunable optical parametric oscillation in silicon micro-resonators [PDF]
We propose a novel scheme for continuous-wave pumped optical parametric oscillation (OPO) inside silicon micro-resonators. The proposed scheme not only requires a relative low lasing threshold, but also exhibits extremely broad tunability extending from ...
Johnson, T. J. +4 more
core +1 more source
Multisecret Threshold Schemes [PDF]
A threshold scheme is a system that protects a secret (key) among a group of participants in such a way that it can only be reconstructed from the joint information held by some predetermined number of these participants. In this paper we extend this problem to one where there is more than one secret that participants can reconstruct using the ...
Wen-Ai Jackson +2 more
openaire +1 more source
How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update
Threshold homomorphic encryption (Threshold HE) schemes are modified homomorphic encryption schemes to be suitable for privacy-preserving data integration and analysis.
Eunkyung Kim +5 more
doaj +1 more source

