Results 1 to 10 of about 564,562 (173)

Characterisations of Ideal Threshold Schemes [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +4 more sources

Threshold Signature Schemes Application

open access: yesБезопасность информационных технологий, 2015
This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva   +1 more
doaj   +1 more source

Efficient Threshold Signature Scheme [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications, 2012
In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length of ...
Sattar J, Mohammad AL-Fayoumi
openaire   +2 more sources

Classical Communication Coset State (t,n) Threshold Quantum Digital Signature

open access: yesIEEE Access, 2023
In the field of quantum communication, classical communication processes have become a central open problem, especially in quantum threshold signature schemes.
Qingshui Xue   +3 more
doaj   +1 more source

A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes

open access: yesIEEE Access, 2022
Recently, threshold ECDSA schemes have received much attention from the security community, due to the need of efficient key management in the blockchain system.
Myungsun Kim   +5 more
doaj   +1 more source

Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation. [PDF]

open access: yesPLoS ONE, 2016
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure.
Lifeng Yuan   +4 more
doaj   +1 more source

Linear Threshold Multisecret Sharing Schemes [PDF]

open access: yesInformation Processing Letters, 2010
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a differ- ent associated access structure. We consider here unconditionally secure schemes with multithreshold access structures.
Farras Ventura, Oriol   +3 more
openaire   +3 more sources

How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update

open access: yesIEEE Access, 2020
Threshold homomorphic encryption (Threshold HE) schemes are modified homomorphic encryption schemes to be suitable for privacy-preserving data integration and analysis.
Eunkyung Kim   +5 more
doaj   +1 more source

Combinatorial repairability for threshold schemes [PDF]

open access: yesDesigns, Codes and Cryptography, 2017
In this paper, we consider methods whereby a subset of players in a $(k,n)$-threshold scheme can "repair" another player's share in the event that their share has been lost or corrupted. This will take place without the participation of the dealer who set up the scheme.
Douglas R. Stinson, Ruizhong Wei
openaire   +2 more sources

Threshold Visual Cryptography Schemes With Tagged Shares

open access: yesIEEE Access, 2020
The appearance of shares encoded by traditional visual cryptography is not easy to distinguish and meaningless. It means the shares cannot be managed efficiently nor user-friendly. A tagged visual cryptography scheme (TVCS) provides additional tag images
Pei-Ling Chiu, Kai-Hui Lee
doaj   +1 more source

Home - About - Disclaimer - Privacy