Results 51 to 60 of about 523,881 (183)

Designated confirmer threshold signature and its applications in blockchains

open access: yesCybersecurity
The non-transferability of a designated confirmer signature scheme allows a signer to control the verification ability of a signature, hence protecting the signer’s privacy.
Yunfeng Ji   +3 more
doaj   +1 more source

A high speed implementation of the random decrement algorithm [PDF]

open access: yes
The algorithm is useful for measuring net system damping levels in stochastic processes and for the development of equivalent linearized system response models. The algorithm works by summing together all subrecords which occur after predefined threshold
Kiraly, L. J.
core   +1 more source

Blockchain-Based Information Security Protection Mechanism for the Traceability of Intellectual Property Transactions

open access: yesSensors
Traditional intellectual property transaction traceability has problems such as information asymmetry, traceability information storage methods relying on centralized databases, and easy tampering of transaction information, etc.
Zheng Wang   +5 more
doaj   +1 more source

Nonlocal restoration of two-mode squeezing in the presence of strong optical loss

open access: yes, 2011
We present the experimental realization of a theoretical effect discovered by Olivares and Paris, in which a pair of entangled optical beams undergoing independent losses can see nonlocal correlations restored by the use of a nonlocal resource ...
Kraute H Muschik C A Jensen K Wasilewski W Petersen J M Ignacio Cirac J Polzik E S   +6 more
core   +1 more source

Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

open access: yesБезопасность информационных технологий, 2015
This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva   +1 more
doaj  

ID-based efficient and proactive threshold proxy signature in the standard model

open access: yesTongxin xuebao, 2011
The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme ...
YU Yi-ke1, ZHENG Xue-feng2
doaj   +2 more sources

Trapped $^{6}$Li : A high T_c superfluid ?

open access: yes, 1999
We consider the effect of the indirect interaction due to the exchange of density fluctuations on the critical temperature of superfluid $^{6}$Li . We obtain the strong coupling equation giving this critical temperature.
A. L. Fetter   +12 more
core   +1 more source

Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain

open access: yesHigh-Confidence Computing
Identity-based threshold signature (IDTHS) allows a threshold number of signers to generate signatures to improve the deterministic wallet in the blockchain.
Jing Tian   +5 more
doaj   +1 more source

Bootstrapping QCD: the Lake, the Peninsula and the Kink

open access: yes, 2018
We consider the S-matrix bootstrap of four dimensional scattering amplitudes with $O(3)$ symmetry and no bound-states. We explore the allowed space of scattering lengths which parametrize the interaction strength at threshold of the various scattering ...
Guerrieri, Andrea L.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy