Results 71 to 80 of about 523,881 (183)
Threshold ring signature for wireless sensor networks
Compared with traditional network,the wireless sensor nodes are limited in the storage,mobility,computation,energy,and so on.A threshold ring signature scheme suitable for wireless sensor networks based on bilinear pairings was proposed.Assuming the ...
Jun-fang XIAO, Jian LIAO, Gui-hua ZENG
doaj +2 more sources
Anonymous threshold signatures
Aquest treball tenia l'objectiu de trobar un esquema de llindar de signatura an\`onima compacte. Tot i no haver-ne trobat cap, s'analitzen diverses solucions que s'acosten a l'objectiu publicades per altres autors i es proposa una millora per obtenir un esquema com el desitjat, però costós i interactiu.
openaire +1 more source
Improvements in estimating proportions of objects from multispectral data [PDF]
Methods for estimating proportions of objects and materials imaged within the instantaneous field of view of a multispectral sensor were developed further.
Horwitz, H. M. +2 more
core +1 more source
The achievements of ring signature and its applications were surveyed.The majority of the schemes were generalized.The advantages and disadvantages of these schemes were analyzed.Some problems in the study of this field were presented,and several main ...
ZHANG Guo-yin +2 more
doaj +2 more sources
Secure distributed signcryption scheme based on vector space
A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ...
LIU Jia, ZHUANG Yi, WANG Jian-dong
doaj +2 more sources
Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity
Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring
Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG
doaj +2 more sources
Optimal Threshold Signatures in Bitcoin
We formulate the design of a threshold signature scheme as made possible on cryptocurrency protocols like Bitcoin. The funds are secured by an m-of-n threshold signature, where at least m signatures are needed to unlock the funds. A user designs this scheme knowing that a malicious attacker can also obtain the signatures with some probability.
Ray, Korok, Saraswathi, Sindura
openaire +2 more sources
Contactless biometric verification from in-air signatures using deep siamese networks. [PDF]
Salturk S, Pamukcu TE, Kahraman N.
europepmc +1 more source
Eliminating single points of trust: a hybrid quantum and post-quantum blockchain with distributed key generation. [PDF]
Goh KW +5 more
europepmc +1 more source

