Results 71 to 80 of about 523,881 (183)

Threshold ring signature for wireless sensor networks

open access: yesTongxin xuebao, 2012
Compared with traditional network,the wireless sensor nodes are limited in the storage,mobility,computation,energy,and so on.A threshold ring signature scheme suitable for wireless sensor networks based on bilinear pairings was proposed.Assuming the ...
Jun-fang XIAO, Jian LIAO, Gui-hua ZENG
doaj   +2 more sources

Anonymous threshold signatures

open access: yes, 2018
Aquest treball tenia l'objectiu de trobar un esquema de llindar de signatura an\`onima compacte. Tot i no haver-ne trobat cap, s'analitzen diverses solucions que s'acosten a l'objectiu publicades per altres autors i es proposa una millora per obtenir un esquema com el desitjat, però costós i interactiu.
openaire   +1 more source

Improvements in estimating proportions of objects from multispectral data [PDF]

open access: yes
Methods for estimating proportions of objects and materials imaged within the instantaneous field of view of a multispectral sensor were developed further.
Horwitz, H. M.   +2 more
core   +1 more source

Threshold Structure-Preserving Signatures

open access: yes, 2023
Elizabeth Crites   +4 more
openaire   +2 more sources

Survey on ring signature

open access: yesTongxin xuebao, 2007
The achievements of ring signature and its applications were surveyed.The majority of the schemes were generalized.The advantages and disadvantages of these schemes were analyzed.Some problems in the study of this field were presented,and several main ...
ZHANG Guo-yin   +2 more
doaj   +2 more sources

Secure distributed signcryption scheme based on vector space

open access: yesTongxin xuebao, 2009
A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ...
LIU Jia, ZHUANG Yi, WANG Jian-dong
doaj   +2 more sources

Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity

open access: yesTongxin xuebao, 2015
Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring
Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG
doaj   +2 more sources

Optimal Threshold Signatures in Bitcoin

open access: yes
We formulate the design of a threshold signature scheme as made possible on cryptocurrency protocols like Bitcoin. The funds are secured by an m-of-n threshold signature, where at least m signatures are needed to unlock the funds. A user designs this scheme knowing that a malicious attacker can also obtain the signatures with some probability.
Ray, Korok, Saraswathi, Sindura
openaire   +2 more sources

Home - About - Disclaimer - Privacy