Results 241 to 250 of about 564,681 (292)
Some of the next articles are maybe not open access.
New threshold-proxy threshold-signature schemes
Computers & Electrical Engineering, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hwang, Shin-Jia, Chen, Chiu-Chin
openaire +1 more source
Quantum Proxy Threshold Multiple Signature Scheme
International Journal of Theoretical Physics, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jing Yu, Jianhua Zhang
openaire +2 more sources
Information Processing Letters, 1994
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sun, Hung-Min, Shieh, Shiuh-Pyng
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sun, Hung-Min, Shieh, Shiuh-Pyng
openaire +1 more source
Proceedings of 1994 IEEE International Symposium on Information Theory, 2002
The notion of families of ideal threshold schemes (ITS) is introduced, their properties and applications are investigated. We consider secret sharing schemes whose parameters can be adjusted. Our model is a threshold scheme family (TSF) whose threshold scheme parameters can be modified dynamically. Some applications of this model includes schemes which
C. Charnes, J. Pieprzyk, R. Safavi-Naini
openaire +1 more source
The notion of families of ideal threshold schemes (ITS) is introduced, their properties and applications are investigated. We consider secret sharing schemes whose parameters can be adjusted. Our model is a threshold scheme family (TSF) whose threshold scheme parameters can be modified dynamically. Some applications of this model includes schemes which
C. Charnes, J. Pieprzyk, R. Safavi-Naini
openaire +1 more source
Optimal Colored Threshold Visual Cryptography Schemes
Designs, Codes and Cryptography, 2005Visual cryptography schemes allow a dealer to divide a secret image into \(n\) shares which can then be distributed to the participants. Part of the participants receive special shares, with special properties which allow them to recover the original image from the shares they have. Such shares are considered to be all in the same set, and the sets are
CIMATO S. +2 more
openaire +4 more sources
An Optimal Multisecret Threshold Scheme Construction
Designs, Codes and Cryptography, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Barwick, S., Jackson, W.
openaire +2 more sources
Contrast Optimal Threshold Visual Cryptography Schemes
SIAM Journal on Discrete Mathematics, 2003The Threshold Visual Cryptography Schemes (VCS) were introduced by \textit{M. Naor} and \textit{A. Shamir} [Lect. Notes Comput. Sci. 950, 1--12 (1995; Zbl 0878.94048)] and have been widely studied since then. A \((k,n)\)-threshold VCS is a method of sharing a secret (black and white) image among a set of \(n\) participants, giving to each of them a ...
BLUNDO, Carlo +3 more
openaire +3 more sources
A Construction for Multisecret Threshold Schemes
Designs, Codes and Cryptography, 1996zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jackson, W.A., Martin, K., O'Keefe, C.
openaire +3 more sources
Threshold Schemes from Isogeny Assumptions
2020We initiate the study of threshold schemes based on the Hard Homogeneous Spaces (HHS) framework of Couveignes. Quantum-resistant HHS based on supersingular isogeny graphs have recently become usable thanks to the record class group precomputation performed for the signature scheme CSI-FiSh.
de Feo, Luca, Meyer, Michaƫl
openaire +1 more source

