Results 21 to 30 of about 567,858 (283)

Multisecret Threshold Schemes [PDF]

open access: yes, 2007
A threshold scheme is a system that protects a secret (key) among a group of participants in such a way that it can only be reconstructed from the joint information held by some predetermined number of these participants. In this paper we extend this problem to one where there is more than one secret that participants can reconstruct using the ...
Wen-Ai Jackson   +2 more
openaire   +1 more source

Electronic voting protocol from bilinear pairings

open access: yesRevista Facultad de Ingeniería Universidad de Antioquia, 2013
Electronic voting has been an active research area since two decades, which involves using information systems and cryptographic schemes in order to reduce costs and human mistakes as well as increase process speed, without discard its security.
Gina Gallegos García   +2 more
doaj   +1 more source

Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]

open access: yesJisuanji gongcheng, 2016
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj   +1 more source

Efficient numerical schemes for viscoplastic avalanches. Part 2: the 2D case [PDF]

open access: yes, 2018
This paper deals with the numerical resolution of a shallow water viscoplastic flow model. Viscoplastic materials are characterized by the existence of a yield stress: below a certain critical threshold in the imposed stress, there is no deformation and ...
Fernández Nieto, Enrique Domingo   +2 more
core   +3 more sources

Physical Layer Authentication Based on Nonlinear Kalman Filter for V2X Communication

open access: yesIEEE Access, 2020
Authentication is an important guarantee for vehicle to everything (V2X) commercial deployment. Currently, V2X security often use identity authentication schemes based on public key infrastructure (PKI).
Jian Wang   +4 more
doaj   +1 more source

Method of Constructing a Nonlinear Approximating Scheme of a Complex Signal: Application Pattern Recognition

open access: yesMathematics, 2021
A method for identification of structures of a complex signal and noise suppression based on nonlinear approximating schemes is proposed. When we do not know the probability distribution of a signal, the problem of identifying its structures can be ...
Oksana Mandrikova   +2 more
doaj   +1 more source

Error suppression via complementary gauge choices in Reed-Muller codes [PDF]

open access: yes, 2017
Concatenation of two quantum error correcting codes with complementary sets of transversal gates can provide a means towards universal fault-tolerant computation.
Chamberland, Christopher   +1 more
core   +2 more sources

Reaching consensus for membership dynamic in secret sharing and its application to cross-chain

open access: yesHigh-Confidence Computing, 2023
The communication efficiency optimization, censorship resilience, and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant (BFT) consensus.
Yan Zhu   +5 more
doaj   +1 more source

Concatenation Schemes for Topological Fault-tolerant Quantum Error Correction [PDF]

open access: yesQuantum, 2023
We investigate a family of fault-tolerant quantum error correction schemes based on the concatenation of small error detection or error correction codes with the three-dimensional cluster state.
Zhaoyi Li, Isaac Kim, Patrick Hayden
doaj   +1 more source

Threshold growth has a limited role in differentiating hepatocellular carcinoma from other focal hepatic lesions

open access: yesBMC Medical Imaging, 2023
Background and Objective The role of threshold growth, as one of the major features (MFs) of hepatocellular carcinoma (HCC) in the Liver Imaging Reporting and Data System (LI-RADS) is inconsistent.
Rong Lyu   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy