Results 251 to 260 of about 567,858 (283)
Some of the next articles are maybe not open access.

Undeniable threshold proxy signature scheme

2013 5th International Conference on Computer Science and Information Technology, 2013
The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group member to cooperatively sign message on behalf of an original signer. In this paper, we also propose a new scheme which includes the features and benefits of the RSA scheme which is a popular security technique.
Sattar J Aboud, Sufian Yousef, Mike Cole
openaire   +1 more source

Distributed Iterative Threshold Control Scheme

IEEE Communications Letters, 2016
Small cell is one of the key technologies in modern wireless communications, extending cell coverage and providing capacity increment. However, challenges still exist in realizing and optimizing the small cell networks. In this letter, we propose a distributed iterative threshold control scheme with minimal increase in hardware complexity to improve ...
Jin Woong Park, Do-Sik Yoo, Seong-Jun Oh
openaire   +1 more source

Threshold proxy signature schemes

1998
Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability efficiently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he ...
openaire   +1 more source

Visual cryptography and threshold schemes

IEEE Potentials, 1999
Visual cryptography is a secret sharing scheme that uses the human visual system to perform computations. In this article, we present some background to traditional secret-sharing schemes, then explain visual schemes, describing some of the basic construction techniques used.
openaire   +1 more source

A Multisecret Sharing Threshold Scheme

2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008
A threshold sharing scheme is a system that protects a secret (key) among a group of participants in such a way that it can only be reconstructed from pooled information held by some certain number of these authorized participants. In this paper we extend this problem to one where there are multiple secrets which participants need reconstruct using the
openaire   +1 more source

A Threshold GQ Signature Scheme

2003
We proposed the first threshold GQ signature scheme. The scheme is unforgeable and robust against any adaptive adversary if the base GQ signature scheme is unforgeable under the chosen message attack and computing the discrete logarithm modulo a safe prime is hard. Furthermore, our scheme can achieve optimal resilience by some modification.
Li-Shan Liu   +2 more
openaire   +1 more source

Features of Linguistic Threshold Schemes

2013
In the discussion of strategic data splitting and sharing algorithms it has become necessary to embed linguistic algorithms of information splitting and data reconstruction in the solutions presented in this publication. The essence of this approach, representing an interdisciplinary topic straddling the border between the subjects of commercial ...
Marek R. Ogiela, Urszula Ogiela
openaire   +1 more source

Threshold Undeniable RSA Signature Scheme

2001
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the concept of this special digital signature ten years ago. Up to now, however, almost all the existed schemes are based on discrete logarithm cryptosystems.
Guilin Wang   +3 more
openaire   +1 more source

A Directed Threshold Signature Scheme

2017
Directed signature is a solution of such problems when signed information is sensitive to message holder/signature receiver. Generally, in a directed signature, the signer is a single entity. But, when a sensitive message is signed by an organization and needs the approval of more than one entity, threshold signature scheme is a solution of this ...
openaire   +1 more source

Shamir's Threshold Scheme

2006
G. R. Blakley, Gregory Kabatiansky
openaire   +1 more source

Home - About - Disclaimer - Privacy