Results 291 to 300 of about 1,107,668 (334)
Some of the next articles are maybe not open access.
A Construction for Multisecret Threshold Schemes
Designs, Codes and Cryptography, 1996zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jackson, W.A., Martin, K., O'Keefe, C.
openaire +3 more sources
Threshold Schemes from Isogeny Assumptions
2020We initiate the study of threshold schemes based on the Hard Homogeneous Spaces (HHS) framework of Couveignes. Quantum-resistant HHS based on supersingular isogeny graphs have recently become usable thanks to the record class group precomputation performed for the signature scheme CSI-FiSh.
de Feo, Luca, Meyer, Michaël
openaire +1 more source
1990
This paper gives constructions of infinite classes of 2, 3 and 4-threshold schemes based on finite incidence structures such as generalised quadrangles and projective planes.
openaire +1 more source
This paper gives constructions of infinite classes of 2, 3 and 4-threshold schemes based on finite incidence structures such as generalised quadrangles and projective planes.
openaire +1 more source
Certificateless Threshold Signature Schemes
2005We analyze the relationship and subtle difference between the notion of certificateless public key cryptography (CL-PKC) and identity-based schemes without a trusted private key generator (PKG), then propose a certificateless threshold signature scheme based on bilinear pairings.
Licheng Wang +3 more
openaire +1 more source
Analysis of fuzzy thresholding schemes
Pattern Recognition, 2000Abstract Fuzzy thresholding schemes preserve the structural details embedded in the original gray distribution. In this paper, various fuzzy thresholding schemes are analysed in detail. Thresholding scheme based on fuzzy clustering has been extended to a possibilistic framework.
C.V. Jawahar, P.K. Biswas, A.K. Ray
openaire +1 more source
Undeniable threshold proxy signature scheme
2013 5th International Conference on Computer Science and Information Technology, 2013The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group member to cooperatively sign message on behalf of an original signer. In this paper, we also propose a new scheme which includes the features and benefits of the RSA scheme which is a popular security technique.
Sattar J Aboud, Sufian Yousef, Mike Cole
openaire +1 more source
Distributed Iterative Threshold Control Scheme
IEEE Communications Letters, 2016Small cell is one of the key technologies in modern wireless communications, extending cell coverage and providing capacity increment. However, challenges still exist in realizing and optimizing the small cell networks. In this letter, we propose a distributed iterative threshold control scheme with minimal increase in hardware complexity to improve ...
Jin Woong Park, Do-Sik Yoo, Seong-Jun Oh
openaire +1 more source
Weighted threshold secret sharing schemes
Information Processing Letters, 1999zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Morillo, P. +3 more
openaire +1 more source
Threshold proxy signature schemes
1998Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability efficiently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he ...
openaire +1 more source
Visual cryptography and threshold schemes
IEEE Potentials, 1999Visual cryptography is a secret sharing scheme that uses the human visual system to perform computations. In this article, we present some background to traditional secret-sharing schemes, then explain visual schemes, describing some of the basic construction techniques used.
openaire +1 more source

