Results 281 to 290 of about 1,107,668 (334)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
New threshold-proxy threshold-signature schemes
Computers & Electrical Engineering, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hwang, Shin-Jia, Chen, Chiu-Chin
openaire +1 more source
Quantum Proxy Threshold Multiple Signature Scheme
International Journal of Theoretical Physics, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jing Yu, Jianhua Zhang
openaire +2 more sources
Information Processing Letters, 1994
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sun, Hung-Min, Shieh, Shiuh-Pyng
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sun, Hung-Min, Shieh, Shiuh-Pyng
openaire +1 more source
Proceedings of 1994 IEEE International Symposium on Information Theory, 2002
The notion of families of ideal threshold schemes (ITS) is introduced, their properties and applications are investigated. We consider secret sharing schemes whose parameters can be adjusted. Our model is a threshold scheme family (TSF) whose threshold scheme parameters can be modified dynamically. Some applications of this model includes schemes which
C. Charnes, J. Pieprzyk, R. Safavi-Naini
openaire +1 more source
The notion of families of ideal threshold schemes (ITS) is introduced, their properties and applications are investigated. We consider secret sharing schemes whose parameters can be adjusted. Our model is a threshold scheme family (TSF) whose threshold scheme parameters can be modified dynamically. Some applications of this model includes schemes which
C. Charnes, J. Pieprzyk, R. Safavi-Naini
openaire +1 more source
Optimal Colored Threshold Visual Cryptography Schemes
Designs, Codes and Cryptography, 2005Visual cryptography schemes allow a dealer to divide a secret image into \(n\) shares which can then be distributed to the participants. Part of the participants receive special shares, with special properties which allow them to recover the original image from the shares they have. Such shares are considered to be all in the same set, and the sets are
CIMATO S. +2 more
openaire +4 more sources
An Optimal Multisecret Threshold Scheme Construction
Designs, Codes and Cryptography, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Barwick, S., Jackson, W.
openaire +2 more sources
Contrast Optimal Threshold Visual Cryptography Schemes
SIAM Journal on Discrete Mathematics, 2003The Threshold Visual Cryptography Schemes (VCS) were introduced by \textit{M. Naor} and \textit{A. Shamir} [Lect. Notes Comput. Sci. 950, 1--12 (1995; Zbl 0878.94048)] and have been widely studied since then. A \((k,n)\)-threshold VCS is a method of sharing a secret (black and white) image among a set of \(n\) participants, giving to each of them a ...
BLUNDO, Carlo +3 more
openaire +3 more sources

