Efficient Threshold Signature Scheme [PDF]
In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length of ...
Sattar J, Mohammad AL-Fayoumi
openaire +2 more sources
The Non--Ergodicity Threshold: Time Scale for Magnetic Reversal [PDF]
We prove the existence of a non-ergodicity threshold for an anisotropic classical Heisenberg model with all-to-all couplings. Below the threshold, the energy surface is disconnected in two components with positive and negative magnetizations respectively.
A. Dembo +14 more
core +1 more source
Signcryption schemes with threshold unsigncryption, and applications [PDF]
The final publication is available at link.springer.comThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security
Herranz Sotoca, Javier +2 more
core +2 more sources
Time-scale analysis of abrupt changes corrupted by multiplicative noise [PDF]
Multiplicative Abrupt Changes (ACs) have been considered in many applications. These applications include image processing (speckle) and random communication models (fading).
Castanié, Francis +2 more
core +2 more sources
Vortex Dynamics and Defects in Simulated Flux Flow [PDF]
We present the results of molecular dynamic simulations of a two-dimensional vortex array driven by a uniform current through random pinning centers at zero temperature. We identify two types of flow of the driven array near the depinning threshold.
A. A. Middleton +37 more
core +3 more sources
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices
This paper presents a new threshold signature scheme based on Damgaard’s work. The proposed scheme allows for changing the message signature threshold, thereby improving the flexibility of the original Damgaard scheme.
Anton Leevik +2 more
doaj +1 more source
Decoding sequential vs non-sequential two-photon double ionization of helium using nuclear recoil [PDF]
Above 54.4 eV, two-photon double ionization of helium is dominated by a sequential absorption process, producing characteristic behavior in the single and triple differential cross sections.
Horner, D. A. +2 more
core +2 more sources
Research Progress and Prospect of Ring Signatures [PDF]
As a special group signature, ring signature has been widely used in anonymous voting, anonymous deposit and anonymous transaction because it can not only complete the signature without the cooperation of ring members, but also ensure the anonymity of ...
XIE Jia, LIU Shizhao, WANG Lu, GAO Juntao, WANG Baocang
doaj +1 more source
Spectral and temporal signatures of ultrarelativistic protons in compact sources [PDF]
We present calculations of the spectral and temporal radiative signatures expected from ultrarelativistic protons in compact sources. The coupling between the protons and the leptonic component is assumed to occur via Bethe-Heitler pair production.
Kirk, J. G. +2 more
core +2 more sources
Direct Test of the Scalar-Vector Lorentz Structure of the Nucleon- and Antinucleon-Nucleus Potential [PDF]
Quantum Hadrodynamics in mean field approximation describes the effective nucleon-nucleus potential (about -50 MeV deep) as resulting from a strong repulsive vector (about 400 MeV) and a strong attractive scalar (about -450 MeV) contribution. This scalar-
Amand Faessler +11 more
core +2 more sources

