Results 1 to 10 of about 567,858 (283)

Characterisations of Ideal Threshold Schemes [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +4 more sources

Classical Communication Coset State (t,n) Threshold Quantum Digital Signature

open access: yesIEEE Access, 2023
In the field of quantum communication, classical communication processes have become a central open problem, especially in quantum threshold signature schemes.
Qingshui Xue   +3 more
doaj   +1 more source

A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes

open access: yesIEEE Access, 2022
Recently, threshold ECDSA schemes have received much attention from the security community, due to the need of efficient key management in the blockchain system.
Myungsun Kim   +5 more
doaj   +1 more source

Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation. [PDF]

open access: yesPLoS ONE, 2016
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure.
Lifeng Yuan   +4 more
doaj   +1 more source

How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update

open access: yesIEEE Access, 2020
Threshold homomorphic encryption (Threshold HE) schemes are modified homomorphic encryption schemes to be suitable for privacy-preserving data integration and analysis.
Eunkyung Kim   +5 more
doaj   +1 more source

Threshold Visual Cryptography Schemes With Tagged Shares

open access: yesIEEE Access, 2020
The appearance of shares encoded by traditional visual cryptography is not easy to distinguish and meaningless. It means the shares cannot be managed efficiently nor user-friendly. A tagged visual cryptography scheme (TVCS) provides additional tag images
Pei-Ling Chiu, Kai-Hui Lee
doaj   +1 more source

Signcryption schemes with threshold unsigncryption, and applications [PDF]

open access: yes, 2014
The final publication is available at link.springer.comThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security
Herranz Sotoca, Javier   +2 more
core   +2 more sources

Theoretical Bounds on Performance in Threshold Group Testing Schemes

open access: yesMathematics, 2020
A threshold group testing (TGT) scheme with lower and upper thresholds is a general model of group testing (GT) which identifies a small set of defective samples. In this paper, we consider the TGT scheme that require the minimum number of tests.
Jin-Taek Seong
doaj   +1 more source

Postselection threshold against biased noise [PDF]

open access: yes, 2006
The highest current estimates for the amount of noise a quantum computer can tolerate are based on fault-tolerance schemes relying heavily on postselecting on no detected errors.
Reichardt, Ben W.
core   +2 more sources

Apply wavelet packet soft threshold noise reduction method to aviation gamma energy spectrum

open access: yesHe jishu, 2022
BackgroundWith the continuous development of nuclear technology, radioactive material exploration requires higher and higher detection accuracy of aerial gamma energy spectrometer, meanwhile, the wavelet packet soft threshold noise reduction method has ...
ZHANG Song   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy