Results 21 to 30 of about 1,111,411 (282)

A Combinatorial Approach to Threshold Schemes [PDF]

open access: yesSIAM Journal on Discrete Mathematics, 1988
We investigate the combinatorial properties of threshold schemes. Informally, a (t,w)-threshold scheme is a way of distributing partial information (shadows) to w participants, so that any t of them can easily calculate a key, but no subset of fewer than t participants can determine the key.
Stinson, D. R., Vanstone, S. A.
openaire   +1 more source

Boolean Operation Based Visual Cryptography

open access: yesIEEE Access, 2019
A ( $k$ , $n$ )-Traditional Visual Cryptographic Scheme (VCS) based on basis matrices encoded a secret image into $n$ shadow images distributed among $n$ participants.
Zhili Zhou   +3 more
doaj   +1 more source

Efficient rare event simulation for failure problems in random media [PDF]

open access: yes, 2014
In this paper we study rare events associated to solutions of elliptic partial differential equations with spatially varying random coefficients. The random coefficients follow the lognormal distribution, which is determined by a Gaussian process.
Liu, Jingchen, Lu, Jianfeng, Zhou, Xiang
core   +1 more source

Reaching consensus for membership dynamic in secret sharing and its application to cross-chain

open access: yesHigh-Confidence Computing, 2023
The communication efficiency optimization, censorship resilience, and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant (BFT) consensus.
Yan Zhu   +5 more
doaj   +1 more source

Bounding inconsistency using a novel threshold metric for dead reckoning update packet generation [PDF]

open access: yes, 2008
Human-to-human interaction across distributed applications requires that sufficient consistency be maintained among participants in the face of network characteristics such as latency and limited bandwidth.
Aspin, R   +5 more
core   +2 more sources

Threshold-Based Fast Successive-Cancellation Decoding of Polar Codes [PDF]

open access: yes, 2020
Fast SC decoding overcomes the latency caused by the serial nature of the SC decoding by identifying new nodes in the upper levels of the SC decoding tree and implementing their fast parallel decoders.
Balatsoukas-Stimming, Alexios   +6 more
core   +2 more sources

QPSK coherent state discrimination via a hybrid receiver [PDF]

open access: yes, 2012
We propose and experimentally demonstrate a near-optimal discrimination scheme for the quadrature phase shift keying protocol (QPSK). We show in theory that the performance of our hybrid scheme is superior to the standard scheme - heterodyne detection ...
Andersen, Ulrik L.   +6 more
core   +3 more sources

Verifiable Threshold Quantum State Sharing Scheme

open access: yesIEEE Access, 2018
Quantum state sharing (QSTS) is a hot topic in quantum cryptography. However, majority of the current structures cannot resist the participant's fraud well during the initial state reconstruction phase.
Hao Cao, Wenping Ma
doaj   +1 more source

Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices

open access: yesCryptography, 2023
This paper presents a new threshold signature scheme based on Damgaard’s work. The proposed scheme allows for changing the message signature threshold, thereby improving the flexibility of the original Damgaard scheme.
Anton Leevik   +2 more
doaj   +1 more source

AMCTD: Adaptive Mobility of Courier nodes in Threshold-optimized DBR Protocol for Underwater Wireless Sensor Networks [PDF]

open access: yes, 2013
In dense underwater sensor networks (UWSN), the major confronts are high error probability, incessant variation in topology of sensor nodes, and much energy consumption for data transmission.
Ahmad, Z.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy