A Combinatorial Approach to Threshold Schemes [PDF]
We investigate the combinatorial properties of threshold schemes. Informally, a (t,w)-threshold scheme is a way of distributing partial information (shadows) to w participants, so that any t of them can easily calculate a key, but no subset of fewer than t participants can determine the key.
Stinson, D. R., Vanstone, S. A.
openaire +1 more source
Boolean Operation Based Visual Cryptography
A ( $k$ , $n$ )-Traditional Visual Cryptographic Scheme (VCS) based on basis matrices encoded a secret image into $n$ shadow images distributed among $n$ participants.
Zhili Zhou +3 more
doaj +1 more source
Efficient rare event simulation for failure problems in random media [PDF]
In this paper we study rare events associated to solutions of elliptic partial differential equations with spatially varying random coefficients. The random coefficients follow the lognormal distribution, which is determined by a Gaussian process.
Liu, Jingchen, Lu, Jianfeng, Zhou, Xiang
core +1 more source
Reaching consensus for membership dynamic in secret sharing and its application to cross-chain
The communication efficiency optimization, censorship resilience, and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant (BFT) consensus.
Yan Zhu +5 more
doaj +1 more source
Bounding inconsistency using a novel threshold metric for dead reckoning update packet generation [PDF]
Human-to-human interaction across distributed applications requires that sufficient consistency be maintained among participants in the face of network characteristics such as latency and limited bandwidth.
Aspin, R +5 more
core +2 more sources
Threshold-Based Fast Successive-Cancellation Decoding of Polar Codes [PDF]
Fast SC decoding overcomes the latency caused by the serial nature of the SC decoding by identifying new nodes in the upper levels of the SC decoding tree and implementing their fast parallel decoders.
Balatsoukas-Stimming, Alexios +6 more
core +2 more sources
QPSK coherent state discrimination via a hybrid receiver [PDF]
We propose and experimentally demonstrate a near-optimal discrimination scheme for the quadrature phase shift keying protocol (QPSK). We show in theory that the performance of our hybrid scheme is superior to the standard scheme - heterodyne detection ...
Andersen, Ulrik L. +6 more
core +3 more sources
Verifiable Threshold Quantum State Sharing Scheme
Quantum state sharing (QSTS) is a hot topic in quantum cryptography. However, majority of the current structures cannot resist the participant's fraud well during the initial state reconstruction phase.
Hao Cao, Wenping Ma
doaj +1 more source
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices
This paper presents a new threshold signature scheme based on Damgaard’s work. The proposed scheme allows for changing the message signature threshold, thereby improving the flexibility of the original Damgaard scheme.
Anton Leevik +2 more
doaj +1 more source
AMCTD: Adaptive Mobility of Courier nodes in Threshold-optimized DBR Protocol for Underwater Wireless Sensor Networks [PDF]
In dense underwater sensor networks (UWSN), the major confronts are high error probability, incessant variation in topology of sensor nodes, and much energy consumption for data transmission.
Ahmad, Z. +4 more
core +1 more source

