Results 21 to 30 of about 528,126 (280)
Efficient Threshold Signature Scheme [PDF]
In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length of ...
Sattar J, Mohammad AL-Fayoumi
openaire +2 more sources
The Non--Ergodicity Threshold: Time Scale for Magnetic Reversal [PDF]
We prove the existence of a non-ergodicity threshold for an anisotropic classical Heisenberg model with all-to-all couplings. Below the threshold, the energy surface is disconnected in two components with positive and negative magnetizations respectively.
A. Dembo +14 more
core +1 more source
Signcryption schemes with threshold unsigncryption, and applications [PDF]
The final publication is available at link.springer.comThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security
Herranz Sotoca, Javier +2 more
core +2 more sources
Time-scale analysis of abrupt changes corrupted by multiplicative noise [PDF]
Multiplicative Abrupt Changes (ACs) have been considered in many applications. These applications include image processing (speckle) and random communication models (fading).
Castanié, Francis +2 more
core +2 more sources
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices
This paper presents a new threshold signature scheme based on Damgaard’s work. The proposed scheme allows for changing the message signature threshold, thereby improving the flexibility of the original Damgaard scheme.
Anton Leevik +2 more
doaj +1 more source
Non-Markovian Decay and Lasing Condition in an Optical Microcavity Coupled to a Structured Reservoir [PDF]
The decay dynamics of the classical electromagnetic field in a leaky optical resonator supporting a single mode coupled to a structured continuum of modes (reservoir) is theoretically investigated, and the issue of threshold condition for lasing in ...
C. Cohen-Tannoudji +8 more
core +2 more sources
Research Progress and Prospect of Ring Signatures [PDF]
As a special group signature, ring signature has been widely used in anonymous voting, anonymous deposit and anonymous transaction because it can not only complete the signature without the cooperation of ring members, but also ensure the anonymity of ...
XIE Jia, LIU Shizhao, WANG Lu, GAO Juntao, WANG Baocang
doaj +1 more source
Decoding sequential vs non-sequential two-photon double ionization of helium using nuclear recoil [PDF]
Above 54.4 eV, two-photon double ionization of helium is dominated by a sequential absorption process, producing characteristic behavior in the single and triple differential cross sections.
Horner, D. A. +2 more
core +2 more sources
Undetachable Threshold Signatures
A major problem of mobile agents is their inability to authenticate transactions in a hostile environment. Users will not wish to equip agents with their private signature keys when the agents may execute on untrusted platforms. Undetachable signatures were introduced to solve this problem by allowing users to equip agents with the means to sign ...
Borselius, Niklas +2 more
openaire +10 more sources
Secure obfuscation for encrypted threshold signatures
Aiming at the key leakage security problem of the threshold signature,an encrypted threshold signature functionality was firstly proposed and securely obfuscated.The output of obfuscated circuit could be implemented by any third party without revealing ...
Yahong LI +4 more
doaj +2 more sources

