Results 51 to 60 of about 523,881 (183)
Designated confirmer threshold signature and its applications in blockchains
The non-transferability of a designated confirmer signature scheme allows a signer to control the verification ability of a signature, hence protecting the signer’s privacy.
Yunfeng Ji +3 more
doaj +1 more source
A high speed implementation of the random decrement algorithm [PDF]
The algorithm is useful for measuring net system damping levels in stochastic processes and for the development of equivalent linearized system response models. The algorithm works by summing together all subrecords which occur after predefined threshold
Kiraly, L. J.
core +1 more source
Traditional intellectual property transaction traceability has problems such as information asymmetry, traceability information storage methods relying on centralized databases, and easy tampering of transaction information, etc.
Zheng Wang +5 more
doaj +1 more source
Nonlocal restoration of two-mode squeezing in the presence of strong optical loss
We present the experimental realization of a theoretical effect discovered by Olivares and Paris, in which a pair of entangled optical beams undergoing independent losses can see nonlocal correlations restored by the use of a nonlocal resource ...
Kraute H Muschik C A Jensen K Wasilewski W Petersen J M Ignacio Cirac J Polzik E S +6 more
core +1 more source
Review and Analysis of Cryptographic Schemes Implementing Threshold Signature
This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva +1 more
doaj
ID-based efficient and proactive threshold proxy signature in the standard model
The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme ...
YU Yi-ke1, ZHENG Xue-feng2
doaj +2 more sources
Trapped $^{6}$Li : A high T_c superfluid ?
We consider the effect of the indirect interaction due to the exchange of density fluctuations on the critical temperature of superfluid $^{6}$Li . We obtain the strong coupling equation giving this critical temperature.
A. L. Fetter +12 more
core +1 more source
Identity-based threshold signature (IDTHS) allows a threshold number of signers to generate signatures to improve the deterministic wallet in the blockchain.
Jing Tian +5 more
doaj +1 more source
Obfuscating encrypted threshold signature algorithm and its applications in cloud computing. [PDF]
Li Y +6 more
europepmc +1 more source
Bootstrapping QCD: the Lake, the Peninsula and the Kink
We consider the S-matrix bootstrap of four dimensional scattering amplitudes with $O(3)$ symmetry and no bound-states. We explore the allowed space of scattering lengths which parametrize the interaction strength at threshold of the various scattering ...
Guerrieri, Andrea L. +2 more
core +1 more source

