Results 281 to 290 of about 1,107,668 (334)

New threshold-proxy threshold-signature schemes

Computers & Electrical Engineering, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hwang, Shin-Jia, Chen, Chiu-Chin
openaire   +1 more source

Quantum Proxy Threshold Multiple Signature Scheme

International Journal of Theoretical Physics, 2021
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jing Yu, Jianhua Zhang
openaire   +2 more sources

On dynamic threshold schemes

Information Processing Letters, 1994
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sun, Hung-Min, Shieh, Shiuh-Pyng
openaire   +1 more source

Families of threshold schemes

Proceedings of 1994 IEEE International Symposium on Information Theory, 2002
The notion of families of ideal threshold schemes (ITS) is introduced, their properties and applications are investigated. We consider secret sharing schemes whose parameters can be adjusted. Our model is a threshold scheme family (TSF) whose threshold scheme parameters can be modified dynamically. Some applications of this model includes schemes which
C. Charnes, J. Pieprzyk, R. Safavi-Naini
openaire   +1 more source

Optimal Colored Threshold Visual Cryptography Schemes

Designs, Codes and Cryptography, 2005
Visual cryptography schemes allow a dealer to divide a secret image into \(n\) shares which can then be distributed to the participants. Part of the participants receive special shares, with special properties which allow them to recover the original image from the shares they have. Such shares are considered to be all in the same set, and the sets are
CIMATO S.   +2 more
openaire   +4 more sources

An Optimal Multisecret Threshold Scheme Construction

Designs, Codes and Cryptography, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Barwick, S., Jackson, W.
openaire   +2 more sources

Contrast Optimal Threshold Visual Cryptography Schemes

SIAM Journal on Discrete Mathematics, 2003
The Threshold Visual Cryptography Schemes (VCS) were introduced by \textit{M. Naor} and \textit{A. Shamir} [Lect. Notes Comput. Sci. 950, 1--12 (1995; Zbl 0878.94048)] and have been widely studied since then. A \((k,n)\)-threshold VCS is a method of sharing a secret (black and white) image among a set of \(n\) participants, giving to each of them a ...
BLUNDO, Carlo   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy