Results 21 to 30 of about 1,107,668 (334)
Boolean Operation Based Visual Cryptography
A ( $k$ , $n$ )-Traditional Visual Cryptographic Scheme (VCS) based on basis matrices encoded a secret image into $n$ shadow images distributed among $n$ participants.
Zhili Zhou +3 more
doaj +1 more source
A Combinatorial Approach to Threshold Schemes [PDF]
We investigate the combinatorial properties of threshold schemes. Informally, a (t,w)-threshold scheme is a way of distributing partial information (shadows) to w participants, so that any t of them can easily calculate a key, but no subset of fewer than t participants can determine the key.
Stinson, D. R., Vanstone, S. A.
openaire +1 more source
Reaching consensus for membership dynamic in secret sharing and its application to cross-chain
The communication efficiency optimization, censorship resilience, and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant (BFT) consensus.
Yan Zhu +5 more
doaj +1 more source
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu +4 more
core +1 more source
Bounding inconsistency using a novel threshold metric for dead reckoning update packet generation [PDF]
Human-to-human interaction across distributed applications requires that sufficient consistency be maintained among participants in the face of network characteristics such as latency and limited bandwidth.
Aspin, R +5 more
core +2 more sources
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices
This paper presents a new threshold signature scheme based on Damgaard’s work. The proposed scheme allows for changing the message signature threshold, thereby improving the flexibility of the original Damgaard scheme.
Anton Leevik +2 more
doaj +1 more source
QPSK coherent state discrimination via a hybrid receiver [PDF]
We propose and experimentally demonstrate a near-optimal discrimination scheme for the quadrature phase shift keying protocol (QPSK). We show in theory that the performance of our hybrid scheme is superior to the standard scheme - heterodyne detection ...
Andersen, Ulrik L. +6 more
core +3 more sources
User-Centric Interference Nulling in Downlink Multi-Antenna Heterogeneous Networks
In heterogeneous networks (HetNets), strong interference due to spectrum reuse affects each user's signal-to-interference ratio (SIR), and hence is one limiting factor of network performance. In this paper, we propose a user-centric interference nulling (
Clerckx, Bruno +3 more
core +1 more source
Apply wavelet packet soft threshold noise reduction method to aviation gamma energy spectrum
BackgroundWith the continuous development of nuclear technology, radioactive material exploration requires higher and higher detection accuracy of aerial gamma energy spectrometer, meanwhile, the wavelet packet soft threshold noise reduction method has ...
ZHANG Song +7 more
doaj +1 more source
We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains ...
A. Karlsson +23 more
core +1 more source

