Sciweavers

525 search results - page 47 / 105
» Threshold Schemes with Disenrollment
Sort
View
ICISC
2003
115views Cryptology» more  ICISC 2003»
13 years 11 months ago
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption
Bid-rigging is a dangerous attack in electronic auction. Abe and Suzuki firstly introduced the idea of receipt-free to prevent this attack. In this paper we point out that Abe and...
Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 10 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
IJNSEC
2007
107views more  IJNSEC 2007»
13 years 10 months ago
A Traitor Tracing Scheme Based on the RSA System
Traitor tracing schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, the data-suppliers ca...
Bo Yang, Hua Ma, Shenglin Zhu
ISLPED
1996
ACM
69views Hardware» more  ISLPED 1996»
14 years 2 months ago
Substrate noise influence on circuit performance in variable threshold-voltage scheme
- This paper investigates substrate noise influence on circuit performance in a variable thresholdvoltage scheme (VT scheme) where threshold voltage is dynamically varied by substr...
Tadahiro Kuroda, Tetsuya Fujita, Shinji Mita, Tosh...
APPT
2005
Springer
14 years 4 days ago
Probabilistic Continuous Update Scheme in Location Dependent Continuous Queries
It is difficult to maintain the exact location of mobile objects due to the limited resources in a mobile network. A consequence of this problem is that the update cost for a locat...
Song Han, Edward Chan