Sciweavers

525 search results - page 19 / 105
» Threshold Schemes with Disenrollment
Sort
View
CSREASAM
2009
13 years 11 months ago
A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures
In this paper we propose a new designated verifier signature scheme based on the threshold signature scheme presented [8] by Ghodosi and Pieprzyk. The advantages of the new scheme ...
Jerome Dossogne, Olivier Markowitch
GLOBECOM
2008
IEEE
14 years 4 months ago
Cooperative and Non-Cooperative Aloha Games with Channel Capture
—Game theory has been a useful tool for the analysis of random-access based wireless networks due to their decentralized operations. This paper studies one of the most widely use...
Younggeun Cho, Fouad A. Tobagi
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
14 years 2 days ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
13 years 10 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 10 months ago
Construction of Dynamic Threshold Decryption Scheme from Pairing
The first dynamic threshold decryption scheme from pairing is presented. It is secure in groups equipped with a bilinear map, and caters to some important requirements in real app...
Yu Long, Kefei Chen