Results 21 to 30 of about 567,858 (283)
Multisecret Threshold Schemes [PDF]
A threshold scheme is a system that protects a secret (key) among a group of participants in such a way that it can only be reconstructed from the joint information held by some predetermined number of these participants. In this paper we extend this problem to one where there is more than one secret that participants can reconstruct using the ...
Wen-Ai Jackson +2 more
openaire +1 more source
Electronic voting protocol from bilinear pairings
Electronic voting has been an active research area since two decades, which involves using information systems and cryptographic schemes in order to reduce costs and human mistakes as well as increase process speed, without discard its security.
Gina Gallegos García +2 more
doaj +1 more source
Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj +1 more source
Efficient numerical schemes for viscoplastic avalanches. Part 2: the 2D case [PDF]
This paper deals with the numerical resolution of a shallow water viscoplastic flow model. Viscoplastic materials are characterized by the existence of a yield stress: below a certain critical threshold in the imposed stress, there is no deformation and ...
Fernández Nieto, Enrique Domingo +2 more
core +3 more sources
Physical Layer Authentication Based on Nonlinear Kalman Filter for V2X Communication
Authentication is an important guarantee for vehicle to everything (V2X) commercial deployment. Currently, V2X security often use identity authentication schemes based on public key infrastructure (PKI).
Jian Wang +4 more
doaj +1 more source
A method for identification of structures of a complex signal and noise suppression based on nonlinear approximating schemes is proposed. When we do not know the probability distribution of a signal, the problem of identifying its structures can be ...
Oksana Mandrikova +2 more
doaj +1 more source
Error suppression via complementary gauge choices in Reed-Muller codes [PDF]
Concatenation of two quantum error correcting codes with complementary sets of transversal gates can provide a means towards universal fault-tolerant computation.
Chamberland, Christopher +1 more
core +2 more sources
Reaching consensus for membership dynamic in secret sharing and its application to cross-chain
The communication efficiency optimization, censorship resilience, and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant (BFT) consensus.
Yan Zhu +5 more
doaj +1 more source
Concatenation Schemes for Topological Fault-tolerant Quantum Error Correction [PDF]
We investigate a family of fault-tolerant quantum error correction schemes based on the concatenation of small error detection or error correction codes with the three-dimensional cluster state.
Zhaoyi Li, Isaac Kim, Patrick Hayden
doaj +1 more source
Background and Objective The role of threshold growth, as one of the major features (MFs) of hepatocellular carcinoma (HCC) in the Liver Imaging Reporting and Data System (LI-RADS) is inconsistent.
Rong Lyu +7 more
doaj +1 more source

