Results 241 to 250 of about 567,858 (283)
Some of the next articles are maybe not open access.
Quantum Proxy Threshold Multiple Signature Scheme
International Journal of Theoretical Physics, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jing Yu, Jianhua Zhang
openaire +2 more sources
Information Processing Letters, 1994
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sun, Hung-Min, Shieh, Shiuh-Pyng
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sun, Hung-Min, Shieh, Shiuh-Pyng
openaire +1 more source
Proceedings of 1994 IEEE International Symposium on Information Theory, 2002
The notion of families of ideal threshold schemes (ITS) is introduced, their properties and applications are investigated. We consider secret sharing schemes whose parameters can be adjusted. Our model is a threshold scheme family (TSF) whose threshold scheme parameters can be modified dynamically. Some applications of this model includes schemes which
C. Charnes, J. Pieprzyk, R. Safavi-Naini
openaire +1 more source
The notion of families of ideal threshold schemes (ITS) is introduced, their properties and applications are investigated. We consider secret sharing schemes whose parameters can be adjusted. Our model is a threshold scheme family (TSF) whose threshold scheme parameters can be modified dynamically. Some applications of this model includes schemes which
C. Charnes, J. Pieprzyk, R. Safavi-Naini
openaire +1 more source
An Optimal Multisecret Threshold Scheme Construction
Designs, Codes and Cryptography, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Barwick, S., Jackson, W.
openaire +2 more sources
Contrast Optimal Threshold Visual Cryptography Schemes
SIAM Journal on Discrete Mathematics, 2003The Threshold Visual Cryptography Schemes (VCS) were introduced by \textit{M. Naor} and \textit{A. Shamir} [Lect. Notes Comput. Sci. 950, 1--12 (1995; Zbl 0878.94048)] and have been widely studied since then. A \((k,n)\)-threshold VCS is a method of sharing a secret (black and white) image among a set of \(n\) participants, giving to each of them a ...
BLUNDO, Carlo +3 more
openaire +3 more sources
A Construction for Multisecret Threshold Schemes
Designs, Codes and Cryptography, 1996zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jackson, W.A., Martin, K., O'Keefe, C.
openaire +3 more sources
Threshold Schemes from Isogeny Assumptions
2020We initiate the study of threshold schemes based on the Hard Homogeneous Spaces (HHS) framework of Couveignes. Quantum-resistant HHS based on supersingular isogeny graphs have recently become usable thanks to the record class group precomputation performed for the signature scheme CSI-FiSh.
de Feo, Luca, Meyer, Michaƫl
openaire +1 more source
1990
This paper gives constructions of infinite classes of 2, 3 and 4-threshold schemes based on finite incidence structures such as generalised quadrangles and projective planes.
openaire +1 more source
This paper gives constructions of infinite classes of 2, 3 and 4-threshold schemes based on finite incidence structures such as generalised quadrangles and projective planes.
openaire +1 more source
Certificateless Threshold Signature Schemes
2005We analyze the relationship and subtle difference between the notion of certificateless public key cryptography (CL-PKC) and identity-based schemes without a trusted private key generator (PKG), then propose a certificateless threshold signature scheme based on bilinear pairings.
Licheng Wang +3 more
openaire +1 more source
Analysis of fuzzy thresholding schemes
Pattern Recognition, 2000Abstract Fuzzy thresholding schemes preserve the structural details embedded in the original gray distribution. In this paper, various fuzzy thresholding schemes are analysed in detail. Thresholding scheme based on fuzzy clustering has been extended to a possibilistic framework.
C.V. Jawahar, P.K. Biswas, A.K. Ray
openaire +1 more source

